{"id":1497,"date":"2013-03-27T10:00:04","date_gmt":"2013-03-27T14:00:04","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/?p=1497"},"modified":"2017-09-24T16:40:05","modified_gmt":"2017-09-24T14:40:05","slug":"ask-the-expert-denis-maslennikov","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/ask-the-expert-denis-maslennikov\/1497\/","title":{"rendered":"Ask the Expert: Denis Maslennikov Answers your Questions Sent via Social Media Networks"},"content":{"rendered":"<p><b>The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to Denis Maslennikov, Senior Malware Analyst at Kaspersky Lab, whose specialist field is mobile threats.<\/b><\/p>\n<p><b><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051254\/maslennikov.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1498\" alt=\"maslennikov\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051254\/maslennikov.jpg\" width=\"638\" height=\"627\"><\/a>\u00a0<\/b><\/p>\n<p><b>Android is now the most popular operating system. I wonder, what types of malicious applications affect it, apart from those which like sending SMS messages?<\/b><\/p>\n<p>Today, SMS Trojans still remain the most widespread malware in Android environments. However, we have seen a dramatic growth in the popularity of backdoors that can communicate with C&amp;C servers, receiving commands from the cybercriminal. Apart from that, spy Trojans are also widespread; this type of malware steals various kinds of information stored on smartphones.<\/p>\n<p>\u00a0<\/p>\n<p><b>Can we believe Microsoft\u2019s specialists when they say that <\/b><b>iPhone jailbreaking is completely safe?<\/b><b><\/b><\/p>\n<p>You are probably talking about the new method of jailbreaking Windows RT that appeared in early January. Microsoft\u2019s official comment contained a statement that this specific method of launching applications that are not signed by Microsoft does not pose a security threat to users. In my opinion, this is not completely true. If any method to bypass security mechanisms that are integrated into the operating system and protect against launching unsigned applications exists, it is a security threat.<\/p>\n<p>\u00a0<\/p>\n<p><b>I hear there are PC viruses that intrude into BIOS firmware and damage your PC, and there is no way for a regular user to detect or repair that damage.\u00a0 Are there similar viruses for mobile devices?<\/b><b><\/b><\/p>\n<p>It was CIH, aka Chernobyl, that caused the damage on PCs. According to various estimates, in the late 1990s some half a million of computers all over the world were affected by that malicious program. A <a href=\"http:\/\/www.securelist.com\/en\/descriptions\/61294\/Virus.Win9x.CIH\" target=\"_blank\" rel=\"noopener nofollow\">more detailed description<\/a> is available. Up to now, nothing of that kind has been detected for mobile devices.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>When installing some Android applications, security products typically detect NoAds-type viruses (these are viruses that are not associated with spam). They get detected even in applications that were previously clean (I downloaded a Skype update from Google Play, then waited until a newer update became available). In which cases I can trust viruses, and in which should I not?<\/b><\/p>\n<p>You should not \u201ctrust\u201d viruses in any cases J. Joking apart, the ads in various legal freeware applications quite often lead to malicious sites that contain a diversity of malware. For example, while playing a free version of Angry Birds, you see a pop-up banner that prompts you to urgently update your Opera mobile browser. It doesn\u2019t matter that Opera may not even be installed on the device. That sort of ad is most likely to lead to a malicious site, from which you could end up downloading malware under the guise of an update.<\/p>\n<p>\u00a0<\/p>\n<p><b>I have <\/b><b>lgp350 Android2.2. Will new versions of Kaspersky be supported and stable working on older devices? And secondly, how can I find out about beta launches and participate in product testing for mobile devices, whether on user forums or elsewhere?<\/b><\/p>\n<p>Android 2.2 is the minimum system requirement for using KMS. Anyone can participate in beta testing, provided that he\/she has an Android smartphone. To do so, you will have to register at Kaspersky Lab\u2019s official forum and leave the appropriate request at the sub-forum for testing mobile device security solutions. <a href=\"http:\/\/forum.kaspersky.com\/index.php?showforum=20\" target=\"_blank\" rel=\"noopener nofollow\">New testing announcements <\/a>are published in the same place.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>What\u2019s your stance on different modifications of Android? E.g. <\/b><b>CyanogenMod, MIUI etc.<\/b><\/p>\n<p>From a security standpoint, our general view is negative. Installing third-party firmware often opens up extra opportunities for cybercriminals to infect smartphones and thus gain control over them. When a user is about to install such a modification, it is important that the he\/she makes a conscious decision to do so.<\/p>\n<p>\u00a0<\/p>\n<p><b>What viruses currently pose the most immediate threat to PCs and mobile devices?<\/b><\/p>\n<p>You can find detailed information about current threats in Kaspersky Lab\u2019s security bulletins:<\/p>\n<p><a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792255\/Kaspersky_Security_Bulletin_2012_The_overall_statistics_for_2012\" target=\"_blank\" rel=\"noopener nofollow\">Security Bulletin 2012:\u00a0The Overall Statistics for 2012<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792254\/Kaspersky_Security_Bulletin_2012_Malware_Evolution\" target=\"_blank\" rel=\"noopener nofollow\">Kasperksy Security Bulletin 2012: Malware Evolution<\/a><\/p>\n<p>As for mobile devices, part six of <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792283\/Mobile_Malware_Evolution_Part_6.\" target=\"_blank\" rel=\"noopener nofollow\">Mobile Malware Evolution<\/a> was published recently.<\/p>\n<p>\u00a0<\/p>\n<p><b>Denis, how easy is it for cybercriminals to penetrate a mobile device? For me, adware is the most malicious type of mobile software. What do you think?<\/b><\/p>\n<p>Actually, social engineering is the easiest and the most effective method to infect mobile devices; it has been that way for a number of years. At the moment, cybercriminals usually need to do little more than camouflage their malware program as, say, a popular software update or new levels for a popular game; with this, cybercriminals can successfully infect smartphones. Sadly, users keep falling for such tricks: they install various malicious programs all by themselves, ignoring the list of permissions that the program requires. Undoubtedly, increasingly more sophisticated methods will keep emerging in the near future, such as drive-by infections. By and large, today it is even easier for cybercriminals to infect smartphones than PCs.<\/p>\n<p>\u00a0<\/p>\n<p><b>Today, there are tons of iOS mobile applications available in AppStore which keep confidential information, such as passwords, credit card details etc. Is it secure to keep information in them? I\u2019m most interested in applications which store data in the cloud and transmit them between the user\u2019s devices (iPhone, iPad, PC). If it is secure, could you please recommend one.<\/b><\/p>\n<p>The security of these applications depends on whether the developers take a responsible approach to their product: ensuring the security of the application itself, the robustness of the encryption algorithms used, proper testing procedures and rapid response to any bugs. If cloud-based services become part of the equation, new factors arise, such as how well protected a specific cloud is, how secure the data channels are, and many others. Basically, your own memory is likely to be the most reliable place to store long and complex passwords that are unique for each individual serviceJ<b><\/b><\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>There are applications which can isolate and differentiate between work and personal content on one smartphone \u2013 particularly, for Android. If the smartphone is infected by a virus, what information is at risk \u2013 business, personal or both? <\/b><\/p>\n<p>Up to now we have not encountered malware which targets data located in \u201ccontainers\u201d.\u00a0 In theory, the possibility of any information theft depends on how well these containers are protected and how reliably the data access policies are set.<\/p>\n<p>This software is appearing because in 2012 a so-called BYOD policy, or bring your own device, gained wide popularity. That is when a personal device is used for work purposes. This can offer obvious advantages to organizations, but when any company allows personal devices to access working data it is vital to consider the protection of those devices and data.<\/p>\n<p><b>\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051252\/s-Android2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1499\" alt=\"s-Android2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051252\/s-Android2.jpg\" width=\"666\" height=\"655\"><\/a><\/b><\/p>\n<p><b>What is your opinion on NFC technology (payment via smartphone)? Are you a supporter or opponent of such \u201cshort\u00a0cuts\u201d? How do you see it from security point of view?<\/b><\/p>\n<p>NFC is a technology which might, of course, help to make different payments easier. But for cybercriminals it\u2019s a new opportunity to steal money from users. And when this technology is widespread and popular among users, hackers will definitely try to attack it and steal money.<\/p>\n<p>Some vulnerabilities have already been discovered. Fortunately, there have been no massive attacks, but I fearit\u2019s only a question of time and popularity.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>What is the most common mobile malware? How can I avoid them, and how can I get rid of them?<\/b><\/p>\n<p>The latest trends are described <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792283\/Mobile_Malware_Evolution_Part_6\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a><a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792283\/Mobile_Malware_Evolution_Part_6\" target=\"_blank\" rel=\"noopener nofollow\"><br>\n<\/a><\/p>\n<p>As for avoiding mobile malware: 1. Don\u2019t click on suspicious links in SMS\/Email\/Social media\/IM messages 2. Avoid jailbreaking\/rooting 3. Use encryption for critical information stored on a device 4. Do not use untrusted Wi-Fi networks 5. Update your OS and third-party software regularly 6. Use a complex security solution with a remote wipe\/block feature 7. Don\u2019t think that your mobile device is safer than your PC.<\/p>\n<div class=\"pullquote\">Undoubtedly, increasingly more sophisticated methods will keep emerging in the near future, such as drive-by infections. By and large, today it is even easier for cybercriminals to infect smartphones than PCs.<\/div>\n<p>\u00a0<\/p>\n<p><b>What is the simplest solution to avoid having my Android cell phone hacked?<\/b><\/p>\n<p>Remove the battery and SIM card from the smartphone, break your device in half, put everything to a metal box, pour cement over it and bury it J OK, just kidding. See the previous answer.<\/p>\n<p>\u00a0<\/p>\n<p><b>What are the risks of installing pirate software?<\/b><b><\/b><\/p>\n<p>If you install pirated software from untrusted sources, there\u2019s always a risk that it will not only be pirated but also \u2018trojanized\u2019. And when installing hacked versions of paid games or apps you will also infect your device with malware.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>Are free apps more dangerous than paid ones? <\/b><\/p>\n<p>If we are talking about official apps from an official app store then it is possible that the apps will show ads to user. And unfortunately sometimes clicking on these ads leads to malicious sites which spread different types of malware.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051250\/s-Malware.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1500\" alt=\"s-Malware\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051250\/s-Malware.jpg\" width=\"666\" height=\"655\"><\/a><\/p>\n<p><b>Do users accept too many uncontrolled permissions on apps? Many apps require unlimited control of your mobile device (i.e., contact list). How can we limit those app privileges?<\/b><\/p>\n<p>I agree that sometimes various applications require a lot of permissions. And unfortunately users don\u2019t read them carefully or fully understand what they are installing and what they are actually allowing. There is only one way to stop it: don\u2019t install the app. But you have to accept all the permissions if you want to use this or that application.<\/p>\n<p>Sometimes reading all the permissions carefully might help you to avoid an infection. Just think, for example, why does a 23 KB \u2018media player\u2019 app need to send text messages or access the contact list? Of course, there\u2019s no need for this app to do any of that.<\/p>\n<p>\u00a0<\/p>\n<p><b>What software do you use?<\/b><\/p>\n<p>Windows 7, Far file manager, Microsoft Office, various browsers, archivers, disassembling software and a lot of internal tools.<\/p>\n<p>\u00a0<\/p>\n<p><b>Monitoring and analyzing must be a constant and endless job. How do you refresh yourself?<\/b><\/p>\n<p>There are many ways ;) Watching movies, reading, listening to my favorite music, drumming, gaming or just simply walking. If I have a week or two for a holiday, I go to the mountains.<\/p>\n<p>\u00a0<\/p>\n<p><b>My Android smartphone is now a part of my life, just like my PC. Do you think Android devices need a firewall to prevent network threats?<\/b><\/p>\n<p>I think that every mobile device needs a complex security solution which can help to avoid various security risks.<\/p>\n<p>\u00a0<\/p>\n<p><b>What should I keep in mind for safe use of tethering?<\/b><\/p>\n<p>If you share your Internet connection, then make sure that you\u2019re sharing it with trusted devices. If you\u2019re using someone\u2019s shared connection, then make sure that it is a trusted device and the owner of the device won\u2019t try to sniff your traffic.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>So, do we need an antivirus for <\/b><b>\u041c\u0430\u0441<\/b><b> OS X 10.8.2? The guys from Apple are insisting we can safely forget about viruses and antiviruses \u2013 they are either absent or the system is highly resistant to viruses. I have a Pro and an iMac and I worry about them\u2026\u00a0 <\/b><\/p>\n<p>Mac viruses exist.\u00a0 Generally they use vulnerabilities in software like Flash or Java. The latest serious accident was the detection of <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792227\/The_anatomy_of_Flashfake_Part_1\" target=\"_blank\" rel=\"noopener nofollow\">Flashfake <\/a>(a.k.a. Flashback) \u2013 a malicious program which, by the end of April 2012, had infected over 748,000 Mac OS X computers.<\/p>\n<p>Don\u2019t forget that there are also threats which are not unique to any operating system: phishing and infected web pages can threaten any device that has an Internet connection.<\/p>\n<p>\u00a0<\/p>\n<p><b>Please explain the functions of mobile Trojans\/worms compared to normal computer malware.<\/b><\/p>\n<p>Behaviors in mobile malware don\u2019t differ from computer malware. There are spying Trojans, downloaders, backdoors, exploits, adware, various destructive Trojans, etc. But there\u2019s one exception. In mobile malware we also deal with SMS Trojans. These are malicious applications which send expensive text messages to premium rate numbers without the user\u2019s consent.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051248\/s-SMStroy.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1501\" alt=\"s-SMStroy\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2013\/03\/06051248\/s-SMStroy.jpg\" width=\"666\" height=\"655\"><\/a><\/p>\n<p><b>Are common threats becoming less popular than software vulnerabilities \u2013 such as Java of Flash? Will security software shift towards solutions that warn users about outdated software installed on their computers? <\/b><\/p>\n<p>We have noticed some changes in the threat landscape and, indeed, many recent examples of serious mass infections confirm that vulnerabilities in operating systems and software like Java, Flash, etc. are used. However, this does not mean classical threats have disappeared and protection is no longer needed.\u00a0 There are some features in Kaspersky products that warn users about outdated software that needs to be updated; we plan to develop them further, both in consumer and corporate products.<\/p>\n<p>\u00a0<\/p>\n<p><b>What\u2019s your opinion on moving the bulk of security solutions into the \u201ccloud\u201d?<\/b><\/p>\n<p>Security provisioning is a complex task that is generally built around the object being secured. If that object is on a local computer, not in the cloud, security must also be located somewhere near it. In this case, cloud technologies will play an auxiliary role, such as enhancing response times.<\/p>\n<p>\u00a0<\/p>\n<p><b>It is said that you shouldn\u2019t use two antivirus programs and this can cause error messages and can even cause the programs to overlook viruses on the system etc. Is this true?<\/b><\/p>\n<p>It\u2019s not worth installing two different antivirus solutions on a machine, as their combined efficiency will be lower than that for one good security software. They will clash and slow each other down. Besides, two antiviruses might delay response to an intentional attack, as the antiviruses will double-check each other. Study the results of independent tests and choose a product based on this information.<\/p>\n<p>\u00a0<\/p>\n<p><b>Is it possible to remove any kind of virus after it infects a computer?<\/b><\/p>\n<p>Almost all viruses can be removed after they infect a computer. But sometimes it is difficult to rectify the consequences. For example, if a file was infected by a virus, in most cases it is possible to cure the file, but it can\u2019t be returned to its original state. Some Trojan-ransomware programs encrypt user files with a very strong algorithm, so these files can\u2019t be decrypted without the original key.<\/p>\n<p>\u00a0<\/p>\n<p><b>How can I see if my computer has been infected by malware? What are the symptoms?<\/b><\/p>\n<p>Common symptoms include strange processes in the task manager, antivirus\/firewall\/Windows display messages about abnormal activity, extraneous files (like autorun.inf) on removable devices, the computer works slowly, network traffic increases, etc.<\/p>\n<p>\u00a0<\/p>\n<p><b>Will targeted threats evolve or will they stay at the current level?<\/b><\/p>\n<p>Random, speculative attacks \u2013 mainly focused on financial data \u2013 continue to dominate the threat landscape.\u00a0 But there\u2019s no question that the volume of targeted attacks has been growing over the last two years.\u00a0 They will certainly evolve.\u00a0 The Internet pervades every aspect of our lives today and this brings with it the risk of an attack by those who want to protest online, steal data or sabotage a system.\u00a0 Since technology itself evolves, attacks will certainly develop alongside this \u2013 new systems will mean new attack techniques.\u00a0 That said, targeted attacks typically start by gathering intelligence \u2013 not least on those people who work in the target organization \u2013 and by using such intelligence to trick individuals into allowing attackers to gain their initial foothold in the organization.<\/p>\n<p><b>\u00a0<\/b><\/p>\n<p><b>Is it possible that malware can destroy hardware, for example that the fan doesn\u2019t work anymore and vibrates very loudly?<\/b><\/p>\n<p>If there\u2019s a software component, it\u2019s certainly possible to damage the hardware, or undermine its normal operation.\u00a0 This isn\u2019t new.\u00a0 In the late 1990s we saw the CIH-Spacefiller virus that was able to overwrite a flash BIOS.\u00a0 That was a one-off at the time.\u00a0 But we\u2019ve seen recent examples of targeted attacks that cause damage to systems \u2013 one of the best-publicized is the damage caused by Stuxnet.<\/p>\n<p>\u00a0<\/p>\n<p><b>What are the prospects of cooperation between Play Market and Kaspersky Lab to manage threats and ensure the security of end users who download applications?<\/b><b><\/b><\/p>\n<p>This kind of cooperation is possible.<b><\/b><\/p>\n<p>\u00a0<\/p>\n<p><b>Is there any \u2018league table\u2019 of the most damaging ways of attacking users of mobile operating systems (whether material or informational)? If so, where is it available? Are there simple ways to secure yourself without purchasing Kaspersky Lab\u2019s products?<\/b><b><\/b><\/p>\n<p>You will find an answer to your question in <a href=\"http:\/\/www.securelist.com\/en\/analysis\/204792283\/Mobile_Malware_Evolution_Part_6\" target=\"_blank\" rel=\"noopener nofollow\">part 6 of Mobile Malware Evolution<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p><b>Do you see Dr. Web free for Android as a rival? Does Kaspersky Lab offer anything better?<\/b><b><\/b><\/p>\n<p>Yes, we do see it as a competitor. However, we can offer much faster and better quality scanning \u2013 as proved by independent testing \u2013 as well as a broader feature list. That features list is also available on the free version that was presented in the product\u2019s latest update. (This update will become available at Google Play a bit later.)<\/p>\n<p>\u00a0<\/p>\n<p><b>Should we expect an updated version of <\/b><b>Kaspersky Parental Control for Android\/iOS to become available? If so, when will that update be released?<\/b><\/p>\n<p>I should emphasize that these features are still in the beta stage. We do not plan to include them in the next update (to be released in the coming few months).<\/p>\n<p>\u00a0<\/p>\n<p><b>Should we expect a version of <\/b><b>Kaspersky Password Manager for Android-based devices?<\/b><\/p>\n<p>Yes you should. It should be available in the near future. Stay tuned \u00a0:)<\/p>\n<p>\u00a0<\/p>\n<p><b>In new versions of <\/b><b>Kaspersky Mobile Security\/ Kaspersky Tablet Security, can we hope to see a new feature for sending a suspicious (phishing) message to the virus lab immediately from your product\u2019s window?<\/b><\/p>\n<p>That\u2019s a good suggestion. We\u2019ll see if we can add this functionality. At present, the checksums of all scanned files are automatically sent to KSN, Kaspersky Lab\u2019s cloud service<\/p>\n<p>\u00a0<\/p>\n<p><b>When will <\/b><b>\u041a<\/b><b>aspersky Mobile Security for WP8 be released?<\/b><\/p>\n<p>In WP8 there is no technical capability to implement an anti-malware solution. It is a closed operating system, similar to iOS. Therefore, I don\u2019t think KMS will become available for that anytime soon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The threats facing mobile devices are among the fastest growing and most serious dangers to the digital world. We gathered your questions on the subject and passed them on to<\/p>\n","protected":false},"author":32,"featured_media":1502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2671],"tags":[356,357,358],"class_list":{"0":"post-1497","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"tag-ask-the-expert","9":"tag-denis-maslennikov","10":"tag-mobile-device-threats"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ask-the-expert-denis-maslennikov\/1497\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ask-the-expert-denis-maslennikov\/618\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ask-the-expert-denis-maslennikov\/1497\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/ask-the-expert\/","name":"ask the expert"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1497"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1497\/revisions"}],"predecessor-version":[{"id":18315,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1497\/revisions\/18315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/1502"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}