{"id":65202,"date":"2016-09-08T10:32:32","date_gmt":"2016-09-08T07:32:32","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65202"},"modified":"2025-01-07T12:03:55","modified_gmt":"2025-01-07T10:03:55","slug":"cyber-security-news-week-1","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1","title":{"rendered":"Cyber Security News Weekly Recap &#8211; and this week it\u2019s all \u2018bout them hacks, no treble"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-65208 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news-recap.png\" alt=\"cyber security news september\" width=\"800\" height=\"547\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news-recap.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news-recap-300x205.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news-recap-768x525.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\nFor a while now we\u2019ve been sharing the most cutting-edge cyber security news with our social community. As part of our mission to help our community be better informed about their internet security and safety, we\u2019ve decided to start a new tradition of aggregating the top stories of the week based on their popularity on our social pages.<\/p>\n<p><span style=\"font-weight: 400;\">Over the past week we focused on hacks, and these are the 4 top stories you don\u2019t want to miss.:<\/span><\/p>\n<figure id=\"attachment_65206\" aria-describedby=\"caption-attachment-65206\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-65206\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/swift-hack.jpg\" alt=\"swift hacked\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/swift-hack.jpg 780w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/swift-hack-300x200.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/swift-hack-768x512.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-65206\" class=\"wp-caption-text\">The SWIFT logo is pictured in this photo illustration taken April 26, 2016. REUTERS\/Carlo Allegri\/Illustration\/File Photo<\/figcaption><\/figure>\n<p><b>Going for the big fish &#8211; Swift discloses multiple cyber thefts<br \/>\n<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Earlier this week Reuters published a statement by SWIFT, a global financial messaging system, that announced that their systems have been hacked several times in the past few months, sometimes successfully. The company was probably forced to reveal this information due to the fact that several of its clients lost money as a result.<\/span><\/p>\n<p><a href=\"http:\/\/www.reuters.com\/article\/us-cyber-heist-swift-idUSKCN11600C\"><span style=\"font-weight: 400;\">Read the full story on Reuters<\/span><\/a><\/p>\n<p><b>Will there ever be an end to the Clinton email hack saga?<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-65205 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/newly-released-clinton-email-documents-fbi-reveal-hacker-breached-bill-clinton-staffers-email.jpg\" alt=\"clinton emails\" width=\"800\" height=\"607\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/newly-released-clinton-email-documents-fbi-reveal-hacker-breached-bill-clinton-staffers-email.jpg 736w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/newly-released-clinton-email-documents-fbi-reveal-hacker-breached-bill-clinton-staffers-email-300x227.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\nI can\u2019t remember a time where I opened the news and didn\u2019t see one or more items about the Clinton email hack. The latest juicy angle in this epic is the released FBI documents conveying that Hillary Clinton\u2019s use of private email servers may have compromised emails by Bill Clinton\u2019s staff. <\/span><\/p>\n<p><a href=\"http:\/\/www.ibtimes.co.uk\/fbis-new-clinton-email-hack-documents-show-hacker-breached-bill-clinton-staffers-email-1579517\"><span style=\"font-weight: 400;\">Read the full story on IBI Times<\/span><\/a><\/p>\n<p><b>The biggest 2016 hacks (so far&#8230;)<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-65204 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/computer-code.jpg\" alt=\"biggest 2016 hacks\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/computer-code.jpg 736w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/computer-code-300x200.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\nThis was, without a doubt, our favorite security news story of the week. For some reason, reading about big companies that have been hacked is fascinating, and we\u2019re unable to stop gawking at them. This particular article gathered some of the biggest hacks of 2016, including the NSA, a couple of national banks and even a voting system.<\/span><\/p>\n<p><a href=\"http:\/\/www.ibtimes.co.uk\/biggest-hacks-2016-panama-papers-dnc-email-leaks-1578968\"><span style=\"font-weight: 400;\">Read the full story on IBI Times<\/span><\/a><\/p>\n<p><b>DropBox Hacked?! Wait was it now or in 2012?&#8230;<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-65203 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/dropbox-hacked.png\" alt=\"68 million dropbox accounts hacked\" width=\"800\" height=\"418\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/dropbox-hacked.png 1456w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/dropbox-hacked-300x157.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/dropbox-hacked-768x401.png 768w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/dropbox-hacked-1024x535.png 1024w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\n<\/span><span style=\"font-weight: 400;\">Maybe the most confusing hacking news of the week that of Dropbox. This consumer-based cloud storage giant suffered a leak of 68 million of its user\u2019s accounts. Apparently this was as a result of a 2012 hack and it\u2019s not clear why we need to worry about it again now. Bottom line, if you have a Dropbox account, know that they\u2019re coming for your files, your passwords, your social networks, your pet\u2019s social networks, ok\u2026 maybe not <\/span><i><span style=\"font-weight: 400;\">that<\/span><\/i><span style=\"font-weight: 400;\"> far. But anyway, just change your passwords and you\u2019ll probably be ok (you might want to give our <\/span><a href=\"https:\/\/www.mywot.com\/blog\/password-leaks\"><span style=\"font-weight: 400;\">secure password tips<\/span><\/a><span style=\"font-weight: 400;\"> a read before you start with the password updates).<\/span><\/p>\n<p><a href=\"http:\/\/thehackernews.com\/2016\/08\/dropbox-data-breach.html\"><span style=\"font-weight: 400;\">Read the full story on The Hacker News<\/span><\/a><\/p>\n<p>*This blog post is a recap of the latest cyber security news this week. Images used in this post are the property of the original publishers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a while now we\u2019ve been sharing the most cutting-edge cyber security news with our social community. As part of our mission to help our community be better informed about their internet security and safety, we\u2019ve decided to start a new tradition of aggregating the top stories of the week based on their popularity on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":65209,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[39],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT<\/title>\n<meta name=\"description\" content=\"Get the latest weekly recap on cyber security with WOT. Read this week&#039;s top stories on hacking, its dangers, and most common forms. Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT\" \/>\n<meta property=\"og:description\" content=\"Get the latest weekly recap on cyber security with WOT. Read this week&#039;s top stories on hacking, its dangers, and most common forms. Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-08T07:32:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:03:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news.png\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"648\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Cyber Security News Weekly Recap &#8211; and this week it\u2019s all \u2018bout them hacks, no treble\",\"datePublished\":\"2016-09-08T07:32:32+00:00\",\"dateModified\":\"2025-01-07T10:03:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\"},\"wordCount\":489,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Safe Browsing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\",\"url\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\",\"name\":\"Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2016-09-08T07:32:32+00:00\",\"dateModified\":\"2025-01-07T10:03:55+00:00\",\"description\":\"Get the latest weekly recap on cyber security with WOT. Read this week's top stories on hacking, its dangers, and most common forms. Learn more!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security News Weekly Recap &#8211; and this week it\u2019s all \u2018bout them hacks, no treble\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT","description":"Get the latest weekly recap on cyber security with WOT. Read this week's top stories on hacking, its dangers, and most common forms. Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT","og_description":"Get the latest weekly recap on cyber security with WOT. Read this week's top stories on hacking, its dangers, and most common forms. Learn more!","og_url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2016-09-08T07:32:32+00:00","article_modified_time":"2025-01-07T10:03:55+00:00","og_image":[{"width":660,"height":648,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Cyber-security-news.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Cyber Security News Weekly Recap &#8211; and this week it\u2019s all \u2018bout them hacks, no treble","datePublished":"2016-09-08T07:32:32+00:00","dateModified":"2025-01-07T10:03:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1"},"wordCount":489,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Safe Browsing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1","url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1","name":"Cyber Security Recap - and this week it\u2019s all \u2018bout them hacks | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2016-09-08T07:32:32+00:00","dateModified":"2025-01-07T10:03:55+00:00","description":"Get the latest weekly recap on cyber security with WOT. Read this week's top stories on hacking, its dangers, and most common forms. Learn more!","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-1#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Cyber Security News Weekly Recap &#8211; and this week it\u2019s all \u2018bout them hacks, no treble"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65202"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65202"}],"version-history":[{"count":6,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65202\/revisions"}],"predecessor-version":[{"id":68115,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65202\/revisions\/68115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/65209"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}