{"id":2854,"date":"2014-04-23T19:17:51","date_gmt":"2014-04-24T01:17:51","guid":{"rendered":"https:\/\/www.antivirusaz.com\/blog\/?p=290"},"modified":"2024-04-22T17:02:03","modified_gmt":"2024-04-23T01:02:03","slug":"what-is-social-engineering","status":"publish","type":"post","link":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/","title":{"rendered":"What is Social Engineering?"},"content":{"rendered":"<p>Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it\u2019s just easier to get a victim to hand over the desired information willingly?<\/p>\n<p>That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing on people\u2019s emotions and trust to get them to knowingly divulge information or download spyware that can send the bad guys down a trail that leads directly to personal data, such as Social Security numbers, bank account numbers, credit card accounts and so on. While social engineering ploys have the same goal as hacks, the method in is often much less sophisticated, but in some cases, terribly effective.<\/p>\n<p>Criminals who use social engineering ploys to part people, their personal information and often their money use trickery to get what they want. Deceptive tactics enable these bad guys to strike targets without targets even realizing they\u2019ve been struck until it\u2019s too late.<\/p>\n<p><strong>Social Engineering Examples to Watch Out For<\/strong><br \/>\nCriminals who rely on social engineering techniques to get people to hand over their personal information tend to use a number of different tricks to achieve their goals. Some examples of social engineering in action include:<\/p>\n<ul>\n<li><strong> Bogus emails or contacts from friends:<\/strong> Once a scammer is successful in getting a person\u2019s email password, for example, he or she gains access to the victim\u2019s entire address book. At this point, the scammer may send out emails under the guise of the actual friend that solicit information or attempt to entice new victims into downloading pictures or files that may contain spyware. This type of scamming also frequently happens on social media networks where scammers attempt to send messages to people their victims\u2019 have friended.<\/li>\n<li><strong> Phishing:<\/strong> Emails that appear to come from legitimate companies are one of the favorite tools of the social engineer. A scammer, for example, may send a very legitimate email that appears to come from a banking institution. The email may ask the recipient to click on a link and log into their bank account to verify information. It might also blatantly ask for personal information, such as a telephone number, bank account number or Social Security number. In the case of links, they may lead directly to a website that is nearly identical to the legitimate business site.<\/li>\n<li><strong> Unsolicited requests:<\/strong> Social engineering can also play heavily on a person\u2019s emotions. Unsolicited emails may come in from strangers or even under the guise of friends or relatives (whose accounts have been hacked) asking for money or other forms of assistance. These emails present an urgent need and oftentimes request wire transfers of money.<\/li>\n<\/ul>\n<p><strong>Tips for Outsmarting the Tricksters<\/strong><br \/>\nSocial engineering is a popular tool of identity thieves because it works. When a message is well presented, victims fall prey because they trust the institution, business or individual sending the request. There are things to look for, however, that can tip off potential victims to social engineering scams and help them mitigate damage if they\u2019ve been struck:<\/p>\n<ul>\n<li><strong>Be wary of all downloads \u2013 even if they come from a friend:<\/strong> Be sure to always virus scan downloads to help avoid inadvertently introducing spyware onto a computer.<\/li>\n<li><strong>Pay attention to the wording of emails and messages:<\/strong> When emails come in from friends or messages arrive via social media, look for clues that might indicate the true author\u2019s identity. If a message doesn\u2019t sound like something a friend would send, it\u2019s probably bogus.<\/li>\n<li><strong>Never give out personal information via email:<\/strong> If an email asks for verification of bank account information, Social Security numbers and so on, do not respond. No one reputable would ask for this type of sensitive information in an unsecured manner.<\/li>\n<li><strong>Be careful clicking through:<\/strong> If a request comes in that asks for verification on a particular website, let\u2019s say a banking website, for example, do not click through on the link. Instead, go directly to the banking website by typing the proper address into a browser. Better yet, call the bank to confirm a problem with an account.<\/li>\n<li><strong>Verify requests for help:<\/strong> If a stranger solicits assistance, chances are the email is bogus. If a friend or relative asks for help via email, pick up the phone and call to find out if the story is true.<\/li>\n<\/ul>\n<p>Social engineers use human nature against humans as they target victim in theft schemes. Stay one step ahead of them by always questioning requests online or off before following through on them.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Additional Online Resources:<\/strong><\/p>\n<ul>\n<li>SANS Institute: <a href=\"https:\/\/www.sans.org\/white-papers\/1365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social Engineering White Papers<\/a><\/li>\n<li>CNET: <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/social-engineering-101-q-a\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social Engineering 101 (Q&amp;A)<\/a><\/li>\n<li>Center for Internet Security: <a href=\"https:\/\/www.cisecurity.org\/spotlight\/cybersecurity-spotlight-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social Engineering: You are at Risk!<\/a><\/li>\n<li>The Information Networking Institute\u00a0by Carnegie Mellon University: <a href=\"https:\/\/www.cmu.edu\/iso\/aware\/dont-take-the-bait\/social-engineering.html\" target=\"_blank\" rel=\"noopener noreferrer\">Social Engineering and Scams<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it\u2019s just easier to get a victim to hand over the desired information willingly? That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing on [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":411,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[322,317],"tags":[],"class_list":["post-2854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy","category-threats"],"blocksy_meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Social Engineering?<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Social Engineering?\" \/>\n<meta property=\"og:description\" content=\"Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it\u2019s just easier to get a victim to hand over the desired information willingly? That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Antivirus and Security Software FAQs &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-24T01:17:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-23T01:02:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"431\" \/>\n\t<meta property=\"og:image:height\" content=\"301\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/\"},\"author\":{\"name\":\"blogger\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/person\\\/bc8b1cd34b6130c6812f39b767b2eed3\"},\"headline\":\"What is Social Engineering?\",\"datePublished\":\"2014-04-24T01:17:51+00:00\",\"dateModified\":\"2024-04-23T01:02:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/\"},\"wordCount\":808,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/social-eng-1.png\",\"articleSection\":[\"Privacy\",\"Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/\",\"name\":\"What is Social Engineering?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/social-eng-1.png\",\"datePublished\":\"2014-04-24T01:17:51+00:00\",\"dateModified\":\"2024-04-23T01:02:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/social-eng-1.png\",\"contentUrl\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2016\\\/01\\\/social-eng-1.png\",\"width\":431,\"height\":301},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/what-is-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Social Engineering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#website\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\",\"name\":\"Antivirus and Security Software FAQs & Blog\",\"description\":\"Frequently asked questions about antivirus and security software, and other computer security related issues.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#organization\"},\"alternateName\":\"AntivirusAZ.com FAQs & Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#organization\",\"name\":\"AntiVirusAZ.com\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/antivirusaz-faq-blog-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/antivirusaz-faq-blog-logo.png\",\"width\":1536,\"height\":512,\"caption\":\"AntiVirusAZ.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.antivirusaz.com\\\/faq\\\/#\\\/schema\\\/person\\\/bc8b1cd34b6130c6812f39b767b2eed3\",\"name\":\"blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g\",\"caption\":\"blogger\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Social Engineering?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"What is Social Engineering?","og_description":"Why spend the time, resources and even money it might cost to hack a computer to steal data and personal information when it\u2019s just easier to get a victim to hand over the desired information willingly? That, according to Microsoft, is the crux of social engineering. This insidious form of cyber theft involves playing on [&hellip;]","og_url":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/","og_site_name":"Antivirus and Security Software FAQs &amp; Blog","article_published_time":"2014-04-24T01:17:51+00:00","article_modified_time":"2024-04-23T01:02:03+00:00","og_image":[{"width":431,"height":301,"url":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png","type":"image\/png"}],"author":"blogger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"blogger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#article","isPartOf":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/"},"author":{"name":"blogger","@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/person\/bc8b1cd34b6130c6812f39b767b2eed3"},"headline":"What is Social Engineering?","datePublished":"2014-04-24T01:17:51+00:00","dateModified":"2024-04-23T01:02:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/"},"wordCount":808,"commentCount":0,"publisher":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#organization"},"image":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png","articleSection":["Privacy","Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/","url":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/","name":"What is Social Engineering?","isPartOf":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png","datePublished":"2014-04-24T01:17:51+00:00","dateModified":"2024-04-23T01:02:03+00:00","breadcrumb":{"@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#primaryimage","url":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png","contentUrl":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2016\/01\/social-eng-1.png","width":431,"height":301},{"@type":"BreadcrumbList","@id":"https:\/\/www.antivirusaz.com\/faq\/what-is-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.antivirusaz.com\/faq\/"},{"@type":"ListItem","position":2,"name":"What is Social Engineering?"}]},{"@type":"WebSite","@id":"https:\/\/www.antivirusaz.com\/faq\/#website","url":"https:\/\/www.antivirusaz.com\/faq\/","name":"Antivirus and Security Software FAQs & Blog","description":"Frequently asked questions about antivirus and security software, and other computer security related issues.","publisher":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#organization"},"alternateName":"AntivirusAZ.com FAQs & Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.antivirusaz.com\/faq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.antivirusaz.com\/faq\/#organization","name":"AntiVirusAZ.com","url":"https:\/\/www.antivirusaz.com\/faq\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/logo\/image\/","url":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png","contentUrl":"https:\/\/www.antivirusaz.com\/faq\/wp-content\/uploads\/2023\/02\/antivirusaz-faq-blog-logo.png","width":1536,"height":512,"caption":"AntiVirusAZ.com"},"image":{"@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.antivirusaz.com\/faq\/#\/schema\/person\/bc8b1cd34b6130c6812f39b767b2eed3","name":"blogger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/af5bbae9fbb5be0cfa8ff754c34f301a36c537b6c9fecd97f77878ef9a707898?s=96&d=robohash&r=g","caption":"blogger"}}]}},"_links":{"self":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/posts\/2854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/comments?post=2854"}],"version-history":[{"count":0,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/posts\/2854\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/media\/411"}],"wp:attachment":[{"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/media?parent=2854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/categories?post=2854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.antivirusaz.com\/faq\/wp-json\/wp\/v2\/tags?post=2854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}