{"id":36,"date":"2023-09-28T10:21:22","date_gmt":"2023-09-28T04:51:22","guid":{"rendered":"https:\/\/www.forensicsware.com\/blog\/?p=36"},"modified":"2023-10-05T15:14:13","modified_gmt":"2023-10-05T09:44:13","slug":"ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/","title":{"rendered":"What Does the Ransomware Attack Mean?"},"content":{"rendered":"<p>Ransomware is a malware that seizes a user&#8217;s access to the computer. This malware circularizes like a Trojan, i.e. enters through a downloaded file or network service vulnerability. Later, a payload begins to encrypt data on hard drive &amp; starts extorting money from the computer owner via Scareware elements.<\/p>\n<p>Though most users delete chat history due to a myriad of reasons, one of the primary one&#8217;s out of which is privacy concerns. However, the culprits behind misuse of social media platforms like Facebook use deletion of chat history as their eventual escape. Nevertheless wiping off crucial messages, indecent media, etc., doesn&#8217;t always mean that you can get away with your wrongdoings. Facebook provides an unearthed tool, i.e., Archive. When the deletion of one&#8217;s Facebook messages is carried out for reasons whatsoever, it is automatically sent into the archived folder. Which means that the data is not permanently lost yet. And retrieval of those messages and media files is still possible for solving criminal cases and prevent similar crime from taking place in the future.<\/p>\n<h2>Ransomware and Its Functioning<\/h2>\n<p>Ransomware and Its Functioning It isn&#8217;t a new technique adopted by the cyber criminals to illicitly extort large sums of money from users. The first occurrence of Ransomware happened in the year 1989 as PC Cyborg Trojan. However, usage of this malware increased largely since 2005 and was delivered to the victim&#8217;s machine by the assaulters in two most common ways:<\/p>\n<ul class=\"list-bullet\">\n<li><strong>Drive-By Transfer:<\/strong>\u00a0This is considered as the most common ways for delivering Ransomware into a computer. You are either supposed to visit a compromised\/malicious website and click on an infected link\/advertisement. Or, the malware enters your computer when a malicious attachment is opened\/downloaded from an email.<\/li>\n<li><strong>Abusing Program Exposure:<\/strong>\u00a0Similar to any malware program, Ransomware targets on attacking and exploiting the security exposures on the operating system or a program installed on it; a web browser for instance.<\/li>\n<\/ul>\n<p><strong>The Concept:<\/strong>\u00a0Basically it is a malware which makes use of payload elements of different types to lock down a computer&#8217;s functioning. However, it is popular known as &#8216;Ransomware&#8217; instead of a &#8216;malware&#8217; because a sum of money (particularly enormous) is demanded back in order to regain access on the system or files on it.<\/p>\n<p><strong>What Happens:<\/strong>\u00a0The payload generally encrypts the files present on the machine using hybrid-encryption or locks down the entire machine by making changes to the boot files. Later, a message stating that:<\/p>\n<ul class=\"list-bullet\">\n<li>Either the application that the user is trying to access has expired, a payment for which has to be made in order to access the associated files.<\/li>\n<li>Or, a fine has to be paid for visiting\/making access to illegal web content (usually obscene) to suppress criminal charges from being made against the affected computer&#8217;s owner.<\/li>\n<\/ul>\n<h2>Variants of the Malware<\/h2>\n<p>There is a vast variety of Ransomware that can be classified into the following categories:<\/p>\n<p><strong>SMS Based Ransomware:<\/strong>\u00a0This kind of Ransomware blocks a user&#8217;s access to their computer and displays a ransom message on screen accompanied by a code. The code has to be sent as an SMS to a premium rated number. Another code will be received for unlocking the machine, once the payment has been made.<\/p>\n<p><strong>File Encryptors:<\/strong>\u00a0These Ransomwares encrypt any\/all file available on the infected machine using complex encryption techniques like \u2013 hybrid-encryption. Author of the malware then demands the victim to make payment for decrypting the files. In a number of cases, the Ransomware leaves a file on the machine often known as the ransom note; offering details of how much and how to pay the ransom amount. Typically this kind of Ransomware does not lock the computer; however this isn&#8217;t a fixed condition.<\/p>\n<p><strong>MBR Ransomware:<\/strong>\u00a0This is one more of the most popular types of Ransomware variant which surpasses all the other types in the way it locks the system. The Master Boot Record is changed in this case which interrupts a normal boot procedure of the computer. This is of the most grievous type as the victim is offered no chance to boot the system and get rid of the malware.<\/p>\n<h3>The Increase in Ratio<\/h3>\n<p>Now Request My Download dialog box will open<\/p>\n<ul>\n<li>Click on\u00a0<strong>Start My Archive<\/strong> again to start the gathering process.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-39\" src=\"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/image006.png\" alt=\"image006\" width=\"435\" height=\"135\" \/><\/li>\n<li>\n<div>\n<p>Now in next window: &#8211;<\/p>\n<ul class=\"list-bullet\">\n<li><strong>Re-enter your password<\/strong>\u00a0dialog box will open.<\/li>\n<li>Enter your\u00a0<strong>Password<\/strong>.<\/li>\n<li>Click on\u00a0<strong>Submit<\/strong>.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-40\" src=\"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/image007.gif\" alt=\"image007\" width=\"445\" height=\"236\" \/><\/p>\n<\/div>\n<\/li>\n<\/ul>\n<h3>Avoid the Impact<\/h3>\n<p><strong>The IMPACT<\/strong><\/p>\n<p>Payments made on the extortion basis are usually irreversible and also difficult to be traced. This is because the assaulters under normal conditions accept payment to be made only through vouchers or much worse; virtual currency which includes the currently in trend &#8216;Bitcoins&#8217;, Moneypak, CashU Codes, Webmoney, etc.<\/p>\n<p><strong>HOW TO AVOID IT?<\/strong><\/p>\n<ul>\n<li>Install applications that can block out executable or compressed archive files before they can reach within your inbox or apply filter within your email.<\/li>\n<li>Update the version and patches of your antivirus program regularly and make sure a genuine and licensed copy is being used.<\/li>\n<li>Keep a regular backup of your essential files\/folders on a removable media to ensure that no compromise is made.<\/li>\n<li>Make settings on the computer&#8217;s software management application to ensure that suspected programs are prevented from accessing critical directories of the system.<\/li>\n<li>Set the Group Policy Object of the computer to restrict the registry key, i.e. database consisting of settings in order to restrict malware to encrypt any data available on the machine.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a malware that seizes a user&#8217;s access to the computer. This malware circularizes like a Trojan, i.e. enters through a downloaded file or network service vulnerability. Later, <\/p>\n","protected":false},"author":2,"featured_media":62,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-36","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Virus \u2013 Beware of Potential Ransomware Attacks<\/title>\n<meta name=\"description\" content=\"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it &amp; demand paymenst to unlock it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Virus \u2013 Beware of Potential Ransomware Attacks\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it &amp; demand paymenst to unlock it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Forensic Services \u2014 Computer Forensics Investigators &amp; eDiscovery Experts\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-28T04:51:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-05T09:44:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"290\" \/>\n\t<meta property=\"og:image:height\" content=\"174\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sambita\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sambita\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/\"},\"author\":{\"name\":\"Sambita\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/#\\\/schema\\\/person\\\/753fb9b344047ddc50397a4c975d7e54\"},\"headline\":\"What Does the Ransomware Attack Mean?\",\"datePublished\":\"2023-09-28T04:51:22+00:00\",\"dateModified\":\"2023-10-05T09:44:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/\"},\"wordCount\":920,\"image\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Ransomware-Attack.png\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/\",\"url\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/\",\"name\":\"Ransomware Virus \u2013 Beware of Potential Ransomware Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Ransomware-Attack.png\",\"datePublished\":\"2023-09-28T04:51:22+00:00\",\"dateModified\":\"2023-10-05T09:44:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/#\\\/schema\\\/person\\\/753fb9b344047ddc50397a4c975d7e54\"},\"description\":\"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it & demand paymenst to unlock it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Ransomware-Attack.png\",\"contentUrl\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/Ransomware-Attack.png\",\"width\":290,\"height\":174,\"caption\":\"Ransomware Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/ransomware-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Does the Ransomware Attack Mean?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/\",\"name\":\"Digital Forensic Services \u2014 Computer Forensics Investigators &amp; eDiscovery Experts\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/#\\\/schema\\\/person\\\/753fb9b344047ddc50397a4c975d7e54\",\"name\":\"Sambita\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g\",\"caption\":\"Sambita\"},\"description\":\"Sambita is a researcher and writer having a keen interest in cybersecurity, digital forensics, and modern technology. With a deep understanding and a desire to indulge in the field of cyber security, she keeps herself up-to-date with the emerging cybersecurity developments and likes to share her knowledge to help businesses &amp; individuals understand the constantly evolving world of online security.\",\"sameAs\":[\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/wp-content\\\/themes\\\/fw\\\/assets\\\/img\\\/sambita.png\"],\"url\":\"https:\\\/\\\/www.forensicsware.com\\\/blog\\\/author\\\/sambita\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Virus \u2013 Beware of Potential Ransomware Attacks","description":"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it & demand paymenst to unlock it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Virus \u2013 Beware of Potential Ransomware Attacks","og_description":"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it & demand paymenst to unlock it.","og_url":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/","og_site_name":"Digital Forensic Services \u2014 Computer Forensics Investigators &amp; eDiscovery Experts","article_published_time":"2023-09-28T04:51:22+00:00","article_modified_time":"2023-10-05T09:44:13+00:00","og_image":[{"width":290,"height":174,"url":"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png","type":"image\/png"}],"author":"Sambita","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sambita","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/"},"author":{"name":"Sambita","@id":"https:\/\/www.forensicsware.com\/blog\/#\/schema\/person\/753fb9b344047ddc50397a4c975d7e54"},"headline":"What Does the Ransomware Attack Mean?","datePublished":"2023-09-28T04:51:22+00:00","dateModified":"2023-10-05T09:44:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/"},"wordCount":920,"image":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png","articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/","url":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/","name":"Ransomware Virus \u2013 Beware of Potential Ransomware Attacks","isPartOf":{"@id":"https:\/\/www.forensicsware.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png","datePublished":"2023-09-28T04:51:22+00:00","dateModified":"2023-10-05T09:44:13+00:00","author":{"@id":"https:\/\/www.forensicsware.com\/blog\/#\/schema\/person\/753fb9b344047ddc50397a4c975d7e54"},"description":"Ransomware is a kind of malware used for data kidnapping. Cyber criminals install it on computers so that they can lock it & demand paymenst to unlock it.","breadcrumb":{"@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#primaryimage","url":"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png","contentUrl":"https:\/\/www.forensicsware.com\/blog\/wp-content\/uploads\/2023\/09\/Ransomware-Attack.png","width":290,"height":174,"caption":"Ransomware Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.forensicsware.com\/blog\/ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forensicsware.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Does the Ransomware Attack Mean?"}]},{"@type":"WebSite","@id":"https:\/\/www.forensicsware.com\/blog\/#website","url":"https:\/\/www.forensicsware.com\/blog\/","name":"Digital Forensic Services \u2014 Computer Forensics Investigators &amp; eDiscovery Experts","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forensicsware.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.forensicsware.com\/blog\/#\/schema\/person\/753fb9b344047ddc50397a4c975d7e54","name":"Sambita","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7c93b1a3eafc766fce03aec4a0a285a6a026caaad62d3c532c6c5b6240b2bc27?s=96&d=mm&r=g","caption":"Sambita"},"description":"Sambita is a researcher and writer having a keen interest in cybersecurity, digital forensics, and modern technology. With a deep understanding and a desire to indulge in the field of cyber security, she keeps herself up-to-date with the emerging cybersecurity developments and likes to share her knowledge to help businesses &amp; individuals understand the constantly evolving world of online security.","sameAs":["https:\/\/www.forensicsware.com\/blog\/wp-content\/themes\/fw\/assets\/img\/sambita.png"],"url":"https:\/\/www.forensicsware.com\/blog\/author\/sambita\/"}]}},"_links":{"self":[{"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/posts\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":6,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/posts\/36\/revisions"}],"predecessor-version":[{"id":65,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/posts\/36\/revisions\/65"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/media\/62"}],"wp:attachment":[{"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/media?parent=36"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/categories?post=36"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forensicsware.com\/blog\/wp-json\/wp\/v2\/tags?post=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}