{"id":65243,"date":"2016-09-22T11:58:12","date_gmt":"2016-09-22T08:58:12","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65243"},"modified":"2025-01-07T12:04:45","modified_gmt":"2025-01-07T10:04:45","slug":"cyber-security-news-week-3","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3","title":{"rendered":"Growing threats from shrinking tech \u2013 Cyber Security News Weekly Recap"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-65251 aligncenter\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM.png\" alt=\"Growing threats from shrinking tech\" width=\"1602\" height=\"1002\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM.png 1602w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM-300x188.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM-768x480.png 768w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM-1024x640.png 1024w\" sizes=\"(max-width: 1602px) 100vw, 1602px\" \/><br \/>\nIn part three of our weekly recap of the hottest security news stories, the topic is hacks and malware from small places we might not normally suspect. This past week we saw a variety of threats emerging into the spotlight in the form of both hardware and software. Here are this week\u2019s top 4 stories:<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65246\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/1474450455274284.png\" alt=\"USBs with malware in Australia\" width=\"800\" height=\"600\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/1474450455274284.png 852w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/1474450455274284-300x225.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/1474450455274284-768x576.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>Attack of the USBs<\/strong><br \/>\nFresh off the press yesterday, a malicious USB attack is underway in Australia. Someone is going around, placing USB sticks in mailboxes. Research from the University of Illinois suggests that nearly 50% of people who pick up a random USB stick plug it in and open the files &#8211; in short, a cybercriminals dream conversion rate. Read more about this malicious USB attack on <\/span><a href=\"http:\/\/motherboard.vice.com\/read\/someone-is-putting-malicious-usb-sticks-in-australian-mailboxes\"><span style=\"font-weight: 400;\">Vice Motherboard<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65247\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.48.55-AM.png\" alt=\"hack iphone for 100 dollars\" width=\"800\" height=\"415\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.48.55-AM.png 725w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.48.55-AM-300x156.png 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>Hacking iPhones can be cheap<\/strong><br \/>\nRemember the FBI vs Apple saga? Apple refused to give the FBI a back door to every iPhone ever so the FBI instead spent $1.3 million to hire a company to hack it. Turns out they overspent. Now anyone can unlock an iPhone for less than $100. Read the full story on <\/span><a href=\"http:\/\/thehackernews.com\/2016\/09\/fbi-iphone-unlock.html\"><span style=\"font-weight: 400;\">The Hacker News<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65248\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Pikachu-detective-970-80.jpg\" alt=\"pokemon go mobile malware\" width=\"800\" height=\"450\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Pikachu-detective-970-80.jpg 770w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Pikachu-detective-970-80-300x169.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Pikachu-detective-970-80-768x432.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>Pokemon NoGo<\/strong><br \/>\nIf you\u2019re like me, the last time you heard from many of your friends was July 6th, the day Pokemon Go was released. Sad as that is, we predicted at the time that it was only a matter of time before someone decides to take advantage of this craze and add malware into the mix. <\/span><span style=\"font-weight: 400;\">Well, it\u2019s happened. Mobile Malware is riding on the coattails of the extremely successful Pokemon Go app, and you can read more about it on <\/span><a href=\"http:\/\/www.techradar.com\/news\/phone-and-communications\/a-pokemon-go-malware-app-was-downloaded-by-half-a-million-people-1328655\"><span style=\"font-weight: 400;\">TechRadar<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65249\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.56.49-AM.png\" alt=\"FBI director covers webcam with tape\" width=\"800\" height=\"415\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.56.49-AM.png 726w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-9.56.49-AM-300x156.png 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>Cover your webcam much?<\/strong><br \/>\nThe hottest story of the week was, surprise, thanks to the FBI. But it\u2019s not what you think (that is, if you\u2019re thinking of Snowden or Apple). At a conference, FBI director James Comey disclosed that he covers his webcam with tape. Will this become the mainstream practice now that Facebook founder Mark Zuckerberg and the director of the FBI? Read more about this story on <\/span><a href=\"http:\/\/thehackernews.com\/2016\/09\/hacking-webcam-cover.html\"><span style=\"font-weight: 400;\">The Hacker News<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>*This blog post is a recap of the latest cyber security news this week. Images used in this post are the property of the original publishers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In part three of our weekly recap of the hottest security news stories, the topic is hacks and malware from small places we might not normally suspect. This past week we saw a variety of threats emerging into the spotlight in the form of both hardware and software. Here are this week\u2019s top 4 stories: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":65251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[39],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT<\/title>\n<meta name=\"description\" content=\"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT\" \/>\n<meta property=\"og:description\" content=\"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-22T08:58:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:04:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1602\" \/>\n\t<meta property=\"og:image:height\" content=\"1002\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Growing threats from shrinking tech \u2013 Cyber Security News Weekly Recap\",\"datePublished\":\"2016-09-22T08:58:12+00:00\",\"dateModified\":\"2025-01-07T10:04:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\"},\"wordCount\":378,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Safe Browsing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\",\"url\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\",\"name\":\"Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2016-09-22T08:58:12+00:00\",\"dateModified\":\"2025-01-07T10:04:45+00:00\",\"description\":\"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Growing threats from shrinking tech \u2013 Cyber Security News Weekly Recap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT","description":"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3","og_locale":"en_US","og_type":"article","og_title":"Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT","og_description":"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.","og_url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2016-09-22T08:58:12+00:00","article_modified_time":"2025-01-07T10:04:45+00:00","og_image":[{"width":1602,"height":1002,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/09\/Screen-Shot-2016-09-22-at-10.52.12-AM.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Growing threats from shrinking tech \u2013 Cyber Security News Weekly Recap","datePublished":"2016-09-22T08:58:12+00:00","dateModified":"2025-01-07T10:04:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3"},"wordCount":378,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Safe Browsing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3","url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3","name":"Growing threats from shrinking tech \u2013 Cyber Security Recap | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2016-09-22T08:58:12+00:00","dateModified":"2025-01-07T10:04:45+00:00","description":"Read our weekly cyber security recap. Discover threats from small tech, including malicious USBs, cheap iPhone hacks, Pokemon Go malware, and webcam cover tips.","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-3#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Growing threats from shrinking tech \u2013 Cyber Security News Weekly Recap"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65243"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65243"}],"version-history":[{"count":3,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65243\/revisions"}],"predecessor-version":[{"id":67340,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65243\/revisions\/67340"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/65251"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}