{"id":65417,"date":"2024-12-05T12:17:36","date_gmt":"2024-12-05T10:17:36","guid":{"rendered":"https:\/\/www.mywot.com\/en\/blog\/?p=65417"},"modified":"2025-01-07T11:24:51","modified_gmt":"2025-01-07T09:24:51","slug":"spot-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails","title":{"rendered":"How to Identify Phishing Emails? Top Warning Signs to Look Out For"},"content":{"rendered":"\n<p>Suppose that you receive an email from what appears to be your bank, warning you that some suspicious activity was noticed for your account. Concerned, you click on the link, and enter your login details hastily and instinctively, and a wave of relief washes over you. A thriving cybercriminal operation has ensued. <a href=\"https:\/\/www.mywot.com\/blog\/phishing-emails\">Phishing emails<\/a> are a huge source of danger, and recognizing them is the best way to stay safe from cybercrime.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Potentially unsafe sender address<\/h2>\n\n\n\n<p>One of the easiest giveaways is an unsafe or suspicious-looking sender address. Phishers often use email addresses that mimic those of trusted organizations, with only slight variations. A single character missing or an extra character in a domain name could be enough to trick the recipient. \u2018support@bankofarnerica.com\u2019 could easily pass as the real \u2018support@bankofamerica.com\u2019, fooling the unwary.<\/p>\n\n\n\n<p>The sender\u2019s address is your best clue, if you look closely. Real firms never use a public email service such as Gmail, Yahoo! Mail, or Hotmail for official business. Instead, as we have explained above, firms always use some kind of custom domain that matches their corporate names. So, if your employer suddenly starts sending official correspondence to your personal email, that is a significant red flag, especially if your company\u2019s legitimate emails have been coming from a different domain. Or if some of their emails reach your spam folder. Check the sender\u2019s email address against previous communiques and look for inconsistencies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fake or misleading web links<\/h2>\n\n\n\n<p>Phishing emails might include links that appear to take you to a legitimate web page, but in reality direct you to a clone, which is set up to try to steal your login credentials or other personal information. One important aspect of how to identify phishing emails is to examine the links they contain.<\/p>\n\n\n\n<p>Another way to spot fakes is to hover over a link without clicking on it \u2013 you should see the actual URL at the bottom of your browser, so it\u2019s easy to compare the link text with the actual added bit. If the URL doesn\u2019t match or if it looks dodgy, just don\u2019t click it. Put the cursor over the link, looking for small alterations such as in the URL www.paypa1.com that replaces the letter l with the number 1.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Errors in spelling, grammar, and formatting<\/h2>\n\n\n\n<p>Phishing emails often feature poor spelling and grammar. Genuine businesses work hard to communicate as clearly as possible, whereas cybercriminals tend to be a bit sloppy. Sentences that sound a bit odd or seem unnaturally awkward, or emails from seemingly respectable companies filled with spelling mistakes, can all be warning signs that you are being targeted by a phishing scam.<\/p>\n\n\n\n<p>For instance, the email \u2018Your account has a suspicious login. Pls click here to verify\u2019 is almost certainly a fraud: any quality control process that a legitimate organization might have would catch and fix typing errors of this nature before it sent emails to customers.<\/p>\n\n\n\n<p>Another clue is odd formatting, such as a mismatched font style or color. Again, emails from professionals come with consistent, logical formatting, while emails from phishers often do not. A phishing email might also employ forced urgency, like \u2018Immediate action required\u2019 in bold red text, which would be out of keeping with normal communication.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Potentially harmful attachments<\/h2>\n\n\n\n<p>A lot of phishing emails come with file attachments that look like genuine documents. Opening these attachments will cause malware to download and install itself on your computer. Files that have file extensions such as .exe, .zip and .scr are especially dangerous. However, even documents such as PDFs or Word files can be loaded with malicious code.<\/p>\n\n\n\n<p>The real giveaway is context: did you expect this email and this attachment? If you didn\u2019t, then back off. Don\u2019t open the attachment \u2013 only open a document attachment, for example, if you can verify independently that it\u2019s what you\u2019re expecting. An invoice from someone you don\u2019t know arriving unasked is a strong sign to back off.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Intimidating threats or deceptive urgency<\/h2>\n\n\n\n<p>Threats or a sense of urgency are major red flags of a phishing scheme. Emails might tell you that your account will be suspended in 24 hours if you don\u2019t verify your login, or that a large penalty awaits you unless you update your billing information before the end of the business day. This pressure might cause you to act rashly and without thinking.<\/p>\n\n\n\n<p>For instance: \u2018Your account will be closed within 24 hours unless you verify your information right now!\u2019 As a general rule, a legitimate organization gives you plenty of time to fix any problems with clear instructions on how to do so.<\/p>\n\n\n\n<p>That\u2019s a crucial clue to the scam, a pointer for how to identify fake emails. Don\u2019t panic and check out the email carefully. Test-check the information, or contact the alleged sender using the contact information you know to be genuine, not just stuff in the email itself<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Requesting sensitive information<\/h2>\n\n\n\n<p>Any request for personal information is a big warning sign for phishing emails. Companies will never ask for passwords, Social Security numbers or credit card numbers through email. Email is not a secure medium for this type of exchange.<\/p>\n\n\n\n<p>If you receive an email asking you to provide information that you would not normally share \u2013 say, a request to \u2018confirm your account details\u2019 or \u2018update your payment information\u2019 \u2013 assume that it is a phishing attempt and use a separate, trusted communication channel to verify it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Non-specific greeting<\/h2>\n\n\n\n<p>Another red flag is the generic greeting often found in phishing emails. When companies you frequent send you email, it\u2019s usually addressed to you by name. Phishers, on the other hand, use generic greetings such as \u2018Dear Customer\u2019, \u2018Dear User\u2019 or \u2018Dear [Your Email Address]\u2019.<\/p>\n\n\n\n<p>An absence of personalization suggests that the sender does not have your real information, but is sending indiscriminately to a broad group of recipients. An email that doesn\u2019t greet you by name should signal you to look more closely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Stay safe from phishing with WOT<\/h2>\n\n\n\n<p>WOT&#8217;s Email Protection provides you with an extensive set of anti-phishing features to protect your email. This includes warnings about phishing attacks and unexpected URLs hidden in the body of an email, as well as additional real-time protection. The Smart Email Detection tool includes the most advanced phishing protection for you, using advanced algorithm models to detect a suspicious email or activity.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><img decoding=\"async\" loading=\"lazy\" width=\"624\" height=\"328\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXekNZzzLbxKqxWWYiCjCClgnNApPIXZS7PvtZle5dUlHoQqat5MQpQ6gquPxmBsfyWIzIcfDYPfFbq4xfK_-e0D4tVj91WQmqSDwSpaIikq4TYYwD_mCQVEqzExkpSes0-V0GT-b8AMNPhp7s8hTqWvL2EZ?key=q5Tbyp09hCsVrmlwhgs0pg\"><\/p>\n\n\n\n<p>Furthermore, WOT keeps you updated on the latest phishing trends and techniques, so you\u2019re always a step ahead of the bad guys. Using the <a href=\"https:\/\/www.mywot.com\/download\">WOT browser add-on<\/a> gives you a strong proactive solution against phishing attacks in email.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Don\u2019t wait\u2014secure your email now<\/h2>\n\n\n\n<p>Fighting back against phishing is both part technology and part human. Take a look at the indicators, stay aware of phishing signs, and never respond until you\u2019re sure of what you are doing.<\/p>\n\n\n\n<p>Be proactive and improve your email security with WOT\u2019s Email Protection and other tools. Real-time phishing alerts can make a real difference. Protect your communications, personal, and financial data. Get it now.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQs<\/h2>\n\n\n\n<p><strong>What should I do if I suspect an email is phishing?<\/strong><\/p>\n\n\n\n<p>If you have any doubts whatsoever that an email might be phishing, just don\u2019t respond to it in any way. Do not click on any links. Do not open any attachments. Do not even reply to it. Instead, report it to your email provider and delete it from your account.&nbsp;<\/p>\n\n\n\n<p><strong>Can phishing emails really look like they are from my bank or company?<\/strong><\/p>\n\n\n\n<p>Yes, there are cleverly disguised phishing emails that can look as though they are from your bank or your company. Always validate that they are real on the official website of the company or by calling on a phone number you know to be genuine.&nbsp;<\/p>\n\n\n\n<p><strong>How often should I update my security software?<\/strong><\/p>\n\n\n\n<p>Keep up to date with your security software so that you benefit from the latest protection against new threats. Set up automatic updates so you are protected against evolving cybersecurity threats.<\/p>\n\n\n\n<p><strong>Is it safe to reply to a suspicious email to verify its legitimacy?<\/strong><\/p>\n\n\n\n<p>No, never reply to any dodgy-looking email. Instead, check the contact details against a verified source, e.g. the official phone number or the company website. Don\u2019t install software unless you trust the source and unless this kind of software is appropriate.<\/p>\n\n\n\n<p><strong>What are the risks of clicking on a phishing link?<\/strong><\/p>\n\n\n\n<p>The consequences of a click can be a virus on your computer, theft of your data, unauthorized access to your accounts, and the availability of your passwords and other financial details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Suppose that you receive an email from what appears to be your bank, warning you that some suspicious activity was noticed for your account. Concerned, you click on the link, and enter your login details hastily and instinctively, and a wave of relief washes over you. A thriving cybercriminal operation has ensued. Phishing emails are [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":68034,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[40],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Identify Phishing Emails? Top Warning Signs | WOT<\/title>\n<meta name=\"description\" content=\"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT&#039;s reliable Email Protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Identify Phishing Emails? Top Warning Signs | WOT\" \/>\n<meta property=\"og:description\" content=\"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT&#039;s reliable Email Protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-05T10:17:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T09:24:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/03\/Learn-How-to-Spot-Phishing-Emails.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"608\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Alex at WOT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex at WOT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\"},\"author\":{\"name\":\"Alex at WOT\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\"},\"headline\":\"How to Identify Phishing Emails? Top Warning Signs to Look Out For\",\"datePublished\":\"2024-12-05T10:17:36+00:00\",\"dateModified\":\"2025-01-07T09:24:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\"},\"wordCount\":1456,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Online Privacy Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\",\"url\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\",\"name\":\"How to Identify Phishing Emails? Top Warning Signs | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2024-12-05T10:17:36+00:00\",\"dateModified\":\"2025-01-07T09:24:51+00:00\",\"description\":\"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT's reliable Email Protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Identify Phishing Emails? Top Warning Signs to Look Out For\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9\",\"name\":\"Alex at WOT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g\",\"caption\":\"Alex at WOT\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Identify Phishing Emails? Top Warning Signs | WOT","description":"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT's reliable Email Protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails","og_locale":"en_US","og_type":"article","og_title":"How to Identify Phishing Emails? Top Warning Signs | WOT","og_description":"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT's reliable Email Protection.","og_url":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2024-12-05T10:17:36+00:00","article_modified_time":"2025-01-07T09:24:51+00:00","og_image":[{"width":1024,"height":608,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2017\/03\/Learn-How-to-Spot-Phishing-Emails.png","type":"image\/png"}],"author":"Alex at WOT","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Alex at WOT","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails"},"author":{"name":"Alex at WOT","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9"},"headline":"How to Identify Phishing Emails? Top Warning Signs to Look Out For","datePublished":"2024-12-05T10:17:36+00:00","dateModified":"2025-01-07T09:24:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails"},"wordCount":1456,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Online Privacy Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/spot-phishing-emails#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails","url":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails","name":"How to Identify Phishing Emails? Top Warning Signs | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2024-12-05T10:17:36+00:00","dateModified":"2025-01-07T09:24:51+00:00","description":"Protect yourself from phishing emails by learning how to identify key warning signs. Know about the features and benefits of WOT's reliable Email Protection.","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/spot-phishing-emails"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/spot-phishing-emails#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"How to Identify Phishing Emails? Top Warning Signs to Look Out For"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/ae7ad33d93b334cdbf7f10ac604f37c9","name":"Alex at WOT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6d775e2b963afb3e50c3cc8ae1745b6e?s=96&d=mm&r=g","caption":"Alex at WOT"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65417"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=65417"}],"version-history":[{"count":8,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65417\/revisions"}],"predecessor-version":[{"id":68035,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/65417\/revisions\/68035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/68034"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=65417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=65417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=65417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}