{"id":65283,"date":"2016-10-13T11:39:26","date_gmt":"2016-10-13T08:39:26","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65283"},"modified":"2025-01-07T12:05:36","modified_gmt":"2025-01-07T10:05:36","slug":"cyber-security-news-week-5","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5","title":{"rendered":"Hacks, Encryption &#038; Malicious Apps! &#8211; CyberSecurity News Weekly Recap"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-65293\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked.png\" alt=\"Google play and mac hacked\" width=\"800\" height=\"451\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked.png 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked-300x169.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked-768x433.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><br \/>\nWith October being CyberSecurity Awareness Month, it has not failed to disappoint with its share of security news stories. Several of the stories released this month so far caught the attention of WOT users, specifically around the topics of hacks, leaks and malware. If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories!<\/span><\/p>\n<p><b>Google Play Store Infiltrated<br \/>\n<img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-65291\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/listening-horns-800x530.jpg\" alt=\"google play infiltrated\" width=\"800\" height=\"530\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/listening-horns-800x530.jpg 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/listening-horns-800x530-300x199.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/listening-horns-800x530-768x509.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/b><span style=\"font-weight: 400;\">Last week we learned that more than 400 malicious apps infiltrated Google Play. The types of malware discovered could be used to turn phones into remote listening posts, gathering sensitive data from protected networks without the owner\u2019s knowledge, or use them as part of a <a href=\"https:\/\/www.mywot.com\/blog\/device-used-ddos-attacks\">botnet<\/a>. One app alone that was infected with DressCode malware was downloaded between 100,000-500,000 times before being removed. Read more about this discovery on <\/span><a href=\"http:\/\/arstechnica.com\/security\/2016\/09\/more-than-400-malicious-apps-infiltrate-google-play\/\"><span style=\"font-weight: 400;\">ArsTechnica<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Facebook Messenger offers Encryption<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65288\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Facebook-Messenger.png\" alt=\"messenger app\" width=\"800\" height=\"500\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Facebook-Messenger.png 791w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Facebook-Messenger-300x187.png 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Facebook-Messenger-768x480.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>If you\u2019re a WhatsApp user, you might remember in April, when all conversations received end-to-end encryption. Facebook is now offering users of its Messenger app the opportunity to encrypt their conversations &#8211; but it\u2019s not automatic, and it needs to be implemented on a per-conversation basis. Read more about how to have \u201c<\/span><a href=\"https:\/\/www.wired.com\/2016\/10\/facebook-completely-encrypted-messenger-update-now\/\"><span style=\"font-weight: 400;\">Secret Conversations<\/span><\/a><span style=\"font-weight: 400;\">\u201d on Facebook through encrypted messages.<\/span><\/p>\n<p><b>Mac Users, Cover your Webcams<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65289\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Mac-webcams-hacked.png\" alt=\"webcams mac\" width=\"800\" height=\"417\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Mac-webcams-hacked.png 725w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/Mac-webcams-hacked-300x156.png 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>For the better part of a decade, Mac users have earned a smug reputation for claiming that there are no viruses that target Macs. It seems that the honeymoon is over for Mac users, as malware that could hack and record webcams and microphones without the owner\u2019s knowledge has been discovered. <\/span><span style=\"font-weight: 400;\">This isn\u2019t less likely to make Mac users less smug (one is writing this &#8211; and I still love my Mac!), but they should now be more wary about what could be on the other end of their <\/span><a href=\"http:\/\/thehackernews.com\/2016\/10\/macbook-camera-hacked.html\"><span style=\"font-weight: 400;\">webcam<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>WikiLeaks goes after Hillary Clinton<\/b><\/p>\n<p><span style=\"font-weight: 400;\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-65290\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/julian-assange.jpg\" alt=\"wikileaks releases clinton emails\" width=\"800\" height=\"512\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/julian-assange.jpg 736w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/julian-assange-300x192.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>This week, WikiLeaks released its second batch of leaked emails from Hillary Clinton\u2019s campaign chairman John Podesta. Russia has been directly blamed by the U.S. government for being behind the DNC hacks. WikiLeaks plans to release all 20,000 emails to the public by the U.S. Presidential election. Read more about the <\/span><a href=\"http:\/\/www.ibtimes.co.uk\/wikileaks-releases-second-batch-2086-hacked-emails-clinton-campaign-chairman-1585682\"><span style=\"font-weight: 400;\">leaked Clinton emails<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">*This blog post is a recap of the latest cybersecurity news this week. Images used in this post are the property of the original publishers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With October being CyberSecurity Awareness Month, it has not failed to disappoint with its share of security news stories. Several of the stories released this month so far caught the attention of WOT users, specifically around the topics of hacks, leaks and malware. If you use a Mac, Android, Facebook Messenger, or are voting in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":65293,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[39],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacks, Encryption &amp; Malicious Apps! - CyberSecurity Recap | WOT<\/title>\n<meta name=\"description\" content=\"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacks, Encryption &amp; Malicious Apps! - CyberSecurity Recap | WOT\" \/>\n<meta property=\"og:description\" content=\"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-13T08:39:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T10:05:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"451\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"Hacks, Encryption &#038; Malicious Apps! &#8211; CyberSecurity News Weekly Recap\",\"datePublished\":\"2016-10-13T08:39:26+00:00\",\"dateModified\":\"2025-01-07T10:05:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\"},\"wordCount\":405,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Safe Browsing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\",\"url\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\",\"name\":\"Hacks, Encryption & Malicious Apps! - CyberSecurity Recap | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2016-10-13T08:39:26+00:00\",\"dateModified\":\"2025-01-07T10:05:36+00:00\",\"description\":\"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacks, Encryption &#038; Malicious Apps! &#8211; CyberSecurity News Weekly Recap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacks, Encryption & Malicious Apps! - CyberSecurity Recap | WOT","description":"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5","og_locale":"en_US","og_type":"article","og_title":"Hacks, Encryption & Malicious Apps! - CyberSecurity Recap | WOT","og_description":"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories","og_url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2016-10-13T08:39:26+00:00","article_modified_time":"2025-01-07T10:05:36+00:00","og_image":[{"width":800,"height":451,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2016\/10\/play-and-mac-hacked.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"Hacks, Encryption &#038; Malicious Apps! &#8211; CyberSecurity News Weekly Recap","datePublished":"2016-10-13T08:39:26+00:00","dateModified":"2025-01-07T10:05:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5"},"wordCount":405,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Safe Browsing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5","url":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5","name":"Hacks, Encryption & Malicious Apps! - CyberSecurity Recap | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2016-10-13T08:39:26+00:00","dateModified":"2025-01-07T10:05:36+00:00","description":"If you use a Mac, Android, Facebook Messenger, or are voting in the upcoming U.S. election, you don\u2019t want to miss out on this week\u2019s most popular stories","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/cyber-security-news-week-5#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"Hacks, Encryption &#038; Malicious Apps! &#8211; CyberSecurity News Weekly Recap"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65283"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65283"}],"version-history":[{"count":8,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65283\/revisions"}],"predecessor-version":[{"id":68117,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65283\/revisions\/68117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/65293"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}