{"id":4854,"date":"2018-07-21T16:30:28","date_gmt":"2018-07-21T11:00:28","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=4854"},"modified":"2021-01-11T17:20:30","modified_gmt":"2021-01-11T11:50:30","slug":"what-is-a-keylogger","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/","title":{"rendered":"What is a keylogger? How to Remove Them"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4855 aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/07\/what-is-a-keylogger.jpg\" alt=\"What is a Keylogger\" width=\"731\" height=\"331\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/07\/what-is-a-keylogger.jpg 731w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/07\/what-is-a-keylogger-300x136.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/07\/what-is-a-keylogger-225x102.jpg 225w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/p>\n<p>The online world is filled with several <strong>types of malware<\/strong> and keyloggers are one of the dangerous malicious codes out there. It records all your keystrokes and sends it to the creator, the information transferred can include login credentials, banking details, internet searches, and private messages.<\/p>\n<p>The <em>Keylogger<\/em> attacks have seen a sharp rise in the recent years and jumped into the spotlight of the cyber threat landscape. This article here explains about keyloggers, why are they so dangerous and how to steer clear from the keyloggers traps. So, keep reading&#8230;<\/p>\n<p><strong>Keylogger \u2013 What are they?<\/strong><\/p>\n<p>Keylogger is the singly coined word for Keystroke Logger words. The term Keylogger as it interprets is a malicious code created by a hacker with the intention of capturing what the user types on their system. Sometimes, it could also be a small device connected to your PC and keyboard. If your system is under a keylogger attack then install an effective malware removal program to get rid of the infection. Sometimes, the damages caused by a keylogger attack can be embarrassing and irreversible.<\/p>\n<p><strong>Find below the list of things that can be stolen from your PC or Laptop:<\/strong><\/p>\n<ul>\n<li>Login Credentials<\/li>\n<li>Passwords<\/li>\n<li>CC\/DB Number and Verification Code<\/li>\n<li>Entire Search History<\/li>\n<li>Entire Chat History<\/li>\n<li>Details of Documents Opened and Worked on<\/li>\n<li>Last but not the least, screenshots of your activity<\/li>\n<\/ul>\n<p>On the contrary, keyloggers made it into the IT world for a different purpose and were not designed to steal private data. Today, corporates use it to check on employees, and more. Nevertheless, it is legal to use a monitoring software and it is readily available online!<\/p>\n<p><strong>How Keylogger Enters A PC?<\/strong><\/p>\n<p>As stated above, Keyloggers are not illegal. However, the necessity for installing the software makes the whole difference. For example, if an organization decides to monitor the productivity of its employees then it may pre-install the software on the laptop. In order to do so, the company may also alter its policy. But this may not be welcomed by the employees.<\/p>\n<p>Besides the productive approach, on the darker side, it is widely used for illegal activities which can cause irreversible damage. It is unsafe to leave the computer unlocked as an intruder may install a <a title=\"What is a keylogger?\" href=\"https:\/\/enterprise.comodo.com\/what-is-a-keylogger.php\" target=\"_blank\" rel=\"noopener\">keylogger<\/a> swiftly when you are away and start to steal your data.<\/p>\n<p>Similar to other types of malware, a keylogger spreads mostly through the Internet. It could get into a system hidden in a Trojan. Trojans act as payloads for such malware and they come in the form of useful programs, files, and tools. It gets installed on the computer\/Laptop without the user&#8217;s consent. After successfully installing on the system, they run in the background and start recording all the keystrokes.<\/p>\n<p>All the recorded information is encrypted and sent to a public message board. Hackers then start downloading it without being traced for their malicious activity. In most of the cases, a hacker is fortunate to steal all the private data until being identified.<\/p>\n<p>To prevent such heinous acts, a powerful antivirus program can come in handy to tackle such unanticipated situations.<\/p>\n<p><strong>Detecting A Keylogger And Steps To Remove It<\/strong><\/p>\n<p>Basically, it is really tough to find out if a computer or laptop has keylogging software installed in it. That&#8217;s because it appears to be a legitimate program!<\/p>\n<p>Here\u2019s are few tips by which you can determine the presence of a keylogger on your computer\/Laptop.<\/p>\n<p>Check for keyloggers while running a process \u2013 open Windows Task Manager and see if there is any suspicious program running in the background. Pay good attention and if required take the assistance of a tech-savvy person to determine its presence on your computer.<\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p>Go through your firewall\u2019s activity log to find anything suspicious. The firewall&#8217;s activity log can brings to light of the data that is going out and coming in on your computer as keyloggers tend to send your data to a remote location.<\/p>\n<p>Besides that, it is a better idea to scan your computer with an <a title=\"antivirus software\" href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-advanced.php\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> as it helps in identifying and removing a keylogger. This approach is very effective rather than manually going through a long list of apps and processes yourself.<\/p>\n<p><strong>Keylogger Hardware<\/strong><\/p>\n<p>It could be a very small gadget connected between your keyboard and PC. Sometimes, the hardware may appear to be an adaptor and look like normal hardware setup, so you\u2019d hardly ever notice them if you didn\u2019t know what to look for.<\/p>\n<p>Make it a point to always check your keyboard especially using a rental computer.<\/p>\n<p><strong>Prevent and Protect Your PC From Keylogger Attacks<\/strong><\/p>\n<p>The best way to stay protected is to distance yourself from installing unknown or skeptic apps which may present an issue. Even though it might seem genuine, free and useful, never download from unsure sources.<\/p>\n<p><strong>Overall Thoughts<\/strong><\/p>\n<p>Have in place an effective antivirus program to prevent malicious apps from being automatically installed on your device. Since such installations happen without the user consent, antivirus programs are capable of handling it better. The Comodo <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">antivirus<\/a> is more capable of detecting and blocking malware. The antivirus can also help you in the malware removal process.<\/p>\n<p>It is the ideal solution with built-in multi-layered defense platform, Comodo Antivirus provides complete protection against any malware threat including keyloggers. For more details our official page.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/malware-vs-viruses-whats-difference\/\">Difference Between Malware and Virus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">Wikipedia DDOS Attack<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\">Best Virus Removal <\/a><\/p>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener\">Free Website Malware Scanner<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\" target=\"blank\">WordPress Security<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener\">Website Status<\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" rel=\"noopener\" target=\"_blank\">Free Web Hosting<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/perform-website-safety-check.php\" rel=\"noopener\" target=\"_blank\">Website Safety Check<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The online world is filled with several types of malware and keyloggers are one of the dangerous malicious codes out there. It records all your keystrokes and sends it to the creator, the information transferred can include login credentials, banking details, internet searches, and private messages. The Keylogger attacks have seen a sharp rise in [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":3097,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[9,63,61],"class_list":["post-4854","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus","tag-free-antivirus","tag-keylogger"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Keylogger | How To Detect Them<\/title>\n<meta name=\"description\" content=\"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Keylogger | How To Detect Them\" \/>\n<meta property=\"og:description\" content=\"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-21T11:00:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-11T11:50:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/\",\"name\":\"What is a Keylogger | How To Detect Them\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg\",\"datePublished\":\"2018-07-21T11:00:28+00:00\",\"dateModified\":\"2021-01-11T11:50:30+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg\",\"width\":650,\"height\":300,\"caption\":\"windows antivirus\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a keylogger? How to Remove Them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Keylogger | How To Detect Them","description":"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/","og_locale":"en_US","og_type":"article","og_title":"What is a Keylogger | How To Detect Them","og_description":"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-07-21T11:00:28+00:00","article_modified_time":"2021-01-11T11:50:30+00:00","og_image":[{"width":650,"height":300,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/","name":"What is a Keylogger | How To Detect Them","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg","datePublished":"2018-07-21T11:00:28+00:00","dateModified":"2021-01-11T11:50:30+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Keylogger is a type of malware that records users information, steal passwords and other sensitive information. Download best Antivirus to secure your PC!","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2017\/01\/windows-antivirus.jpg","width":650,"height":300,"caption":"windows antivirus"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-keylogger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a keylogger? How to Remove Them"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4854","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=4854"}],"version-history":[{"count":26,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4854\/revisions"}],"predecessor-version":[{"id":15779,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4854\/revisions\/15779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/3097"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=4854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=4854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=4854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}