{"id":505,"date":"2017-05-31T12:02:16","date_gmt":"2017-05-31T12:02:16","guid":{"rendered":"http:\/\/www.protegent360.com\/blog\/?p=505"},"modified":"2023-03-02T14:02:59","modified_gmt":"2023-03-02T08:32:59","slug":"major-sources-of-ransomware-attack-in-computer-system","status":"publish","type":"post","link":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/","title":{"rendered":"Major Sources of Ransomware Attack in Computer System"},"content":{"rendered":"<p>Computer user might have heard about Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace. Ransomware is getting really popular behind the reason of demand of ransom from the victim user to remove the ransomware encryption on user\u2019s computer system.<\/p>\n<p><!--more--><\/p>\n<p>Before getting into the major sources of ransomware, let get some brief of Ransomware. Ransomware can\u2019t be called completely a virus but correctly termed as Encryption Program. Ransomware gets into user\u2019s computer system make the data files or operating system inaccessible to the user. When the victim tries to access the blocked data files or operating system, Ransomware shows a warning message the file\/OS has been locked by Ransomware and the ransom amount need to be paid to the victim get unblock the files\/OS.<\/p>\n<p>There are broadly three categories of Ransomware known at the present namely:<\/p>\n<ul>\n<li><strong>Encryption Ransomware<\/strong> which gets into users computer &amp; starts encrypting the data files present in computer system, making them inaccessible to the user.<\/li>\n<li><strong>Locker Ransomware<\/strong> which doesn\u2019t allow user from accessing the storage drives, desktop and other apps by locking the victim out of the operating system. It doesn\u2019t allow the user to login to the operating system and shows a warning of ransomware attack and notice for ransom payment.<\/li>\n<li><strong>MBR Ransomware<\/strong> which doesn\u2019t allows Master Boot Record to boot the operating system and blocks the computer system from loading. This is the most annoying ransomware attack as it attacks the MBR which is responsible for booting the operating system.<\/li>\n<\/ul>\n<p>Now let\u2019s see into the major sources of Ransomware attack to your computer system:<\/p>\n<ol>\n<li><strong><u>Through Email Attachments<\/u><\/strong><\/li>\n<\/ol>\n<p>The most common source of Ransomware attack is through email attachments which comes along with the emails generally from trusted domains which the user does have trust on. These Ransomware email can come on webmail, outlook, and Gmail as well. The most common form of ransomware attachment is in the form of invoice from company\u2019s domain. When the user opens the attachment from the email, the Ransomware gets into users storage devices and starts infecting the computer system depending on its functionality. Some ransomware encrypts the data files present on computer system, blocks the login to operating making desktop, apps, and drives in accessible to the user and sometimes block the MBR (Master Boot Record) from loading the operating system. Ransomware always shows a message of \u201c<strong>Your Computer has been locked by Ransomware<\/strong>\u201d and ask the victim to pay a ransom amount to unlock the blocked files, OS or MBR. There is no guarantee that the hacker will provide the unlock key to the victim after receiving the ransom amount.<\/p>\n<ol start=\"2\">\n<li><strong><u>Through Downloads from Spam Websites<\/u><\/strong><\/li>\n<\/ol>\n<p>With the increase in download speed, computer user tends to download software from spam website for free software offered by them. Now a day, ransomware attacks have been reported through the spam download websites which claims to provide free download of software to the user. When user downloads the software from such websites, Ransomware also gets downloaded along with it and starts infecting the data files and operating system.<\/p>\n<p>We do recommend computer users that they should never open emails from unknown sources and if they are opening it, then never open the attachment or download the same as it might be an attempt of ransomware attack. There might be some case where the user gets a ransomware attack from trusted emails. In such cases, if the user has some doubt about the source of the email, then we recommend that they should first check the reliability of the email and then only open the attachment in the same. We also recommend user not to download free antivirus software from spam website which might result in bug financial losses to the victim.<\/p>\n<p>That\u2019s it in today\u2019s discussion on \u201cSources of Ransomware Attack\u201d.<\/p>\n<p>We do believe that the information which is flourished above and correct as per our research. But we always welcome comments or suggestion regarding the above discussion. We would be obliged to receive any thoughts from our readers.<\/p>\n<p>Thanks for reading our blog. We will be right back with some more interesting blogs.<\/p>\n<h4><strong>Follow us on:-<\/strong><\/h4>\n<p><a href=\"https:\/\/protegent360.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png\" alt=\"\" width=\"148\" height=\"32\" \/><\/a> \u00a0<a href=\"https:\/\/twitter.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11066\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-100x100.png 100w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11067\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials.png 640w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.instagram.com\/unistalglobal\/?hl=en\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11068\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1024x1024.png 1024w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1536x1536.png 1536w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-100x100.png 100w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.facebook.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11069\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019.png 800w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.youtube.com\/c\/UnistalGlobal\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11070\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png\" alt=\"\" width=\"37\" height=\"37\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb.png 512w\" sizes=\"auto, (max-width: 37px) 100vw, 37px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer user might have heard about Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace. Ransomware is getting really popular behind the reason of demand of ransom from the victim user to remove the ransomware encryption on user\u2019s computer system.<\/p>\n","protected":false},"author":20,"featured_media":12188,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103,104,134,133,105,106],"tags":[158,160,204,157,244],"class_list":["post-505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-antivirus-software-2","category-our-complete-security-software","category-enterprise-security","category-internet-security","category-p360","category-our-total-security-software","tag-india","tag-online","tag-protegent","tag-ransomware","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Major Sources of Ransomware Attack in Computer System<\/title>\n<meta name=\"description\" content=\"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Major Sources of Ransomware Attack in Computer System\" \/>\n<meta property=\"og:description\" content=\"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Our Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-31T12:02:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-02T08:32:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2017\/05\/Major-Sources-of-Ransomware-Attack-in-Computer-System-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"251\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/protegent360.com\/blog\/#website\",\"url\":\"https:\/\/protegent360.com\/blog\/\",\"name\":\"Our Blog\",\"description\":\"World&#039;s Only Antivirus with Data Recovery Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/protegent360.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/\",\"url\":\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/\",\"name\":\"Major Sources of Ransomware Attack in Computer System\",\"isPartOf\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#website\"},\"datePublished\":\"2017-05-31T12:02:16+00:00\",\"dateModified\":\"2023-03-02T08:32:59+00:00\",\"author\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\"},\"description\":\"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.\",\"breadcrumb\":{\"@id\":\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/protegent360.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Major Sources of Ransomware Attack in Computer System\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Major Sources of Ransomware Attack in Computer System","description":"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/","og_locale":"en_US","og_type":"article","og_title":"Major Sources of Ransomware Attack in Computer System","og_description":"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.","og_url":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/","og_site_name":"Our Blog","article_published_time":"2017-05-31T12:02:16+00:00","article_modified_time":"2023-03-02T08:32:59+00:00","og_image":[{"width":680,"height":251,"url":"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2017\/05\/Major-Sources-of-Ransomware-Attack-in-Computer-System-1.webp","type":"image\/webp"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/protegent360.com\/blog\/#website","url":"https:\/\/protegent360.com\/blog\/","name":"Our Blog","description":"World&#039;s Only Antivirus with Data Recovery Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/protegent360.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/","url":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/","name":"Major Sources of Ransomware Attack in Computer System","isPartOf":{"@id":"https:\/\/protegent360.com\/blog\/#website"},"datePublished":"2017-05-31T12:02:16+00:00","dateModified":"2023-03-02T08:32:59+00:00","author":{"@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790"},"description":"Ransomware which is the most popular computer virus (Encryption program) affecting people around the world at an increasing pace.","breadcrumb":{"@id":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/protegent360.com\/blog\/major-sources-of-ransomware-attack-in-computer-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/protegent360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Major Sources of Ransomware Attack in Computer System"}]},{"@type":"Person","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/comments?post=505"}],"version-history":[{"count":1,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions"}],"predecessor-version":[{"id":12097,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/505\/revisions\/12097"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media\/12188"}],"wp:attachment":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media?parent=505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/categories?post=505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/tags?post=505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}