{"id":130,"date":"2014-09-04T15:03:00","date_gmt":"2014-09-04T15:03:00","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=130"},"modified":"2021-02-24T15:04:44","modified_gmt":"2021-02-24T09:34:44","slug":"short-history-computer-viruses","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/","title":{"rendered":"A Short History of Computer Viruses"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12924\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/02\/computer-viruses-history.png\" alt=\"Computer Virus History\" width=\"650\" height=\"300\" \/><br \/>\nComputers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves. \u00a0Most people use the term \u201c<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\" target=\"_blank\" rel=\"noopener\">computer virus<\/a>\u201d to refer to all malicious software, which we call malware. Computer Viruses are actually just one type of malware, a self-replicating programs designed to spread itself from computer to computer. A virus is, in fact, the earliest known malware invented.<\/p>\n<p>The following is a history of some of the most famous viruses and malware ever:<\/p>\n<p><strong>1949 &#8211; 1966 &#8211; Self-Reproducing Automata: <\/strong>Self-replicating programs were established in 1949, to produce a large number of\u00a0 viruses,\u00a0 John von Neumann, whose known to be the &#8220;Father of Cybernetics&#8221;, wrote an article on the &#8220;Theory of Self-Reproducing Automata&#8221; that was published in 1966.<\/p>\n<p><strong>1959 &#8211; Core Wars:<\/strong> A computer game was programmed in Bell Laboratory by Victor Vysottsky, H. Douglas McIlroy and Robert P Morris. They named it Core Wars. In this game, infectious programs named organisms competed with the processing time of PC.<\/p>\n<p><strong>1971 &#8211; The Creeper:<\/strong> Bob Thomas developed an experimental self-replicating program. It accessed through ARPANET (The Advanced Research Projects Agency Network) and copied to a remote host systems with TENEX operating system. A message displayed that \u201cI\u2019m the creeper, catch me if you can!\u201d. Another program named Reaper was created to delete the existing harmful program the Creaper.<\/p>\n<p><strong>1974 &#8211; Wabbit (Rabbit):<\/strong> This infectious program was developed to make multiple copies of itself on a computer clogging the system reducing the performance of the computer.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>1974 &#8211; 1975 &#8211;\u00a0 ANIMAL:<\/strong> John Walker developed a program called ANIMAL for the UNIVAC 1108. This was said to be a non-malicious Trojan that is known to spread through shared tapes.<\/p>\n<p><strong>1981- Elk Cloner: <\/strong>A program called the &#8220;Elk Cloner&#8221; was developed by Richard Skrenta for the Apple II Systems. This was created to infect Apple DOS 3.3. These programs started to spread through files and folders that are transferred to other computers by floppy disk.<\/p>\n<p><strong>1983 &#8211; <\/strong>This was the year when the term &#8220;Virus&#8221; was coined by Frederick Cohen for the computer programs that are infectious as it has the tendency to replicate.<\/p>\n<p><strong>1986 &#8211;\u00a0 Brain:<\/strong> This is a virus also known as the &#8220;Brain boot sector&#8221;, that is compatible with IBM PC\u00a0 was programmed and developed by two Pakistani programmers Basit Farooq Alvi, and his brother, Amjad Farooq Alvi.<\/p>\n<p><strong>1987- Lehigh:<\/strong> This virus was programmed to infect command.com files from Yale University.<\/p>\n<p><strong>Cascade: <\/strong>This virus is a self-encrypted file virus which was the outcome of IBM&#8217;s own antivirus product.<\/p>\n<p><strong>Jerusalem Virus:<\/strong> This type of virus was first detected in the city of Jerusalem. This was developed to destroy all files in an infected computers on the thirteenth day that falls on a Friday.<\/p>\n<p><strong>1988 &#8211; The Morris Worm:<\/strong> This type of worm was created by Robert Tappan Morris to infect DEC VAX and Sun machines running BSD UNIX through the Internet.\u00a0 This is best known for exploiting the computers that are prone to buffer overflow vulnerabilities.<\/p>\n<p><strong>1990 &#8211;<\/strong> Symantec launched one of the first antivirus programs called the Norton Antivirus, to fight against the infectious viruses. The first family of polymorphic virus called the Chameleon was developed by Ralf Burger.<\/p>\n<p><strong>1995 \u2013 Concept:<\/strong> This virus name Concept was created to spread and attack Microsoft Word documents.<\/p>\n<p><strong>1996 &#8211; <\/strong>A macro virus known as <strong>Laroux<\/strong> was developed to infect Microsoft Excel Documents, A virus named <strong>Baza<\/strong> was developed to infect Windows 95 and Virus named <strong>Staog<\/strong> was created to infect Linux.<\/p>\n<p><strong>1998 &#8211; CIH Virus:<\/strong> The release of the first version of CIH viruses developed by Chen Ing Hau from Taiwan.<\/p>\n<p><strong>1999 &#8211; Happy99:<\/strong> This type of worm was developed to attach itself to emails with a message Happy New Year. Outlook Express and Internet Explorer on Windows 95 and 98 were affected.<\/p>\n<p><strong>2000 &#8211; ILOVEYOU:<\/strong> The virus is capable of deleting files in JPEGs, MP2, or MP3 formats.<\/p>\n<p><strong>2001 &#8211; Anna Kournikova: <\/strong>This virus was spread by emails to the contacts in the compromised address book of Microsoft Outlook. The emails purported to contain pictures of the very attractive female tennis player, but in fact hid a malicious virus.<\/p>\n<p><strong>2002 &#8211; LFM-926:<\/strong> This virus was developed to infect Shockware Flash files.<\/p>\n<p><strong>Beast or RAT:<\/strong> This is backdoor Trojan horse and is capable of infecting all versions of Windows OS.<\/p>\n<p><strong>2004 &#8211; MyDoom: <\/strong>This infectious worm also called the Novang. This was developed to share files and permits hackers to access to infected computers. It is known as the fastest mailer worm.<\/p>\n<p><strong>2005 &#8211; Samy XXA:<\/strong> This type of virus was developed to spread faster and it is known to infect the Windows family.<\/p>\n<p><strong>2006 &#8211; OSX\/Leap-A:<\/strong> This was the first ever known malware discovered against Mac OS X.<\/p>\n<p><strong>Nyxem:<\/strong> This type of\u00a0 worm was created to spread by mass-mailing, destroying Microsoft Office files.<\/p>\n<p><strong>2007 &#8211; Storm Worm: <\/strong>This was a fast spreading email spamming threat against Microsoft systems that compromised millions of systems.<\/p>\n<p><strong>Zeus: <\/strong>This is a <a title=\"What is a Trojan Virus?\" href=\"https:\/\/enterprise.comodo.com\/what-is-a-trojan-virus.php\" target=\"_blank\" rel=\"noopener\">type of Trojan<\/a> that infects used capture login credentials from banking web sites and commit financial fraud.<\/p>\n<p><strong>2008 &#8211; Koobface:<\/strong> This virus was developed and created to target Facebook and MySpace users.<\/p>\n<p><strong>2010 &#8211; Kenzero: <\/strong>The is a virus that spreads online between sites through browsing history.<\/p>\n<p><strong>2013 &#8211; Cryptolocker:<\/strong> This is trojan horse encrypts the files infected \u00a0machine and demands a ransom to unlock the files.<\/p>\n<p><strong>2014 &#8211; Backoff:<\/strong> Malware designed to compromise Point-of-Sale (POS) systems to steal credit card data.<\/p>\n<p>Sad to say, the history will continue. That makes keeping up with the latest <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> and firewall technology ever so important.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\">Top 10 Free Antivirus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<hr noshade=\"noshade\" \/>\n<p><strong>Get Your Website Secured Today<\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/?af=9356\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3247 size-full\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/12\/comodo-website-security-software.gif\" alt=\"Free Web Security Software\" width=\"650\" height=\"90\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">Wikipedia Hacked by DDoS Attack<\/a><br \/>\n<a title=\"Download Free Antivirus\" href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"blank\">Free Antivirus<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/security\/best-free-antivirus-program\/\" target=\"blank\">Best Free Antivirus<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">Best Antivirus<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/malware-vs-viruses-whats-difference\/\" target=\"blank\">Malware Vs Virus<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/5-best-free-malware-removal-tools-2019\/\" target=\"blank\">Malware Removal<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\" target=\"blank\">Best Virus Removal<\/a><br \/>\n<a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-for-mac.php\">Mac Virus Removal<\/a><br \/>\n<a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-virus-and-its-definition\/\" target=\"_blank\" rel=\"noopener\">Types of Computer Virus<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/what-is-an-itsm-tool.php\" rel=\"noopener\" target=\"_blank\">What Is An ITSM Tool<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves. \u00a0Most people use the term \u201ccomputer virus\u201d to refer to all malicious software, which we call malware. Computer Viruses are actually just one type of malware, a self-replicating programs designed to spread [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":132,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates<\/title>\n<meta name=\"description\" content=\"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"og:description\" content=\"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-04T15:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T09:34:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/\",\"name\":\"A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg\",\"datePublished\":\"2014-09-04T15:03:00+00:00\",\"dateModified\":\"2021-02-24T09:34:44+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Short History of Computer Viruses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/","og_locale":"en_US","og_type":"article","og_title":"A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates","og_description":"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2014-09-04T15:03:00+00:00","article_modified_time":"2021-02-24T09:34:44+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/","name":"A Short History of Computer Viruses - Comodo Antivirus Blogs | Anti-Virus Software Updates","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg","datePublished":"2014-09-04T15:03:00+00:00","dateModified":"2021-02-24T09:34:44+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Computers and computer users are under assault by hackers like never before, but computer viruses are almost as old as electronic computers themselves.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/signposts.jpg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/short-history-computer-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Short History of Computer Viruses"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":54,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":15937,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/130\/revisions\/15937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/132"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}