{"id":5578,"date":"2018-11-21T16:04:40","date_gmt":"2018-11-21T10:34:40","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=5578"},"modified":"2025-06-16T19:46:48","modified_gmt":"2025-06-16T14:16:48","slug":"logic-bomb","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/","title":{"rendered":"What is a Logic Bomb?"},"content":{"rendered":"<p>The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date\/time is reached \u2013 it triggers the logic bomb malware to start running on a computer. Online fraudsters make use of the logic bomb malware in a variety of ways. Attackers usually embed the code within a bogus application, or Trojan horse, and will automatically execute whenever the user launches the fake software.<\/p>\n<p>Online criminals may try deploying a mixture of spyware and <strong>logic bombs<\/strong> in an attempt to steal a user&#8217;s identity. For instance, spyware is used by online fraudsters to covertly install a keylogger on a computer. The keylogger captures the keystrokes of the user and sends it back to the implanter\/remote attacker, the information are usually the usernames and passwords.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5579\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/logic-bomb.png\" alt=\"Logic Bomb\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/logic-bomb.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/logic-bomb-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/logic-bomb-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>However, in the case of a logic bomb malware, it waits for the user to visit a website that requires you to log in with the credentials. The details could include a banking site or social network. In the process, the logic bomb will automatically execute the keylogger and capture the user credentials and send it back to the creator.<\/p>\n<p><strong>South Korea Logic Bomb Malware Attack<\/strong><\/p>\n<p>A malware attack wiped the computer\u2019s hard drive in South Korea relating to the banks and broadcasting companies. It was later identified as the logic bomb in the code by the security firm in the U.S. The malware dictated the date and time to erase the data from machines to coordinate the destruction across multiple victims.<\/p>\n<p>The <strong>logic bomb attack<\/strong> wiped the hard drives and master boot record of at least three banks and two media companies simultaneously. It also made a few ATMs go out of operation, preventing the South Koreans from withdrawing cash. (<a href=\"https:\/\/www.legendsofbasketball.com\/klonopin-online\/\">Clonazepam online<\/a>) <\/p>\n<h2>How to prevent logic bombs?<\/h2>\n<p>Logic bombs are hard to prevent due to the reason that they can be deployed from anywhere. A remote attacker can plant a logic bomb through numerous ways on multiple platforms by hiding the malicious code in a script or deploying it on a SQL server.<\/p>\n<p>In companies, allocation of duties may offer protection against logic bombs. By limiting employee access to specific files and folders, a potential attacker will be exposed to carry out the logic bomb deployment and this may prevent the subject to carry out the attack.<\/p>\n<p>Today, many companies execute a business continuity and disaster recovery plan. This approach basically includes processes such as data backups and recovery. In the case of an unanticipated logic bomb attack and it was to purge important data, the company can implement the disaster recovery plan. Some of the necessary steps to recover from the attack are listed here go through them keenly.<\/p>\n<div itemtype=\"https:\/\/schema.org\/ItemList\">\n<h2 itemprop=\"name\">How to prevent logic bombs?<\/h2>\n<p itemprop=\"description\">Some of the necessary steps to recover from the attack are listed here go through them keenly<\/p>\n<ul itemprop=\"itemListOrder\" href=\"https:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"6\" \/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Never download pirated software \u2013 cybercriminals implant Logic bombs using such software. <\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"2\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Make sure that the shareware\/freeware applications that you install are from a trusted source since Logic bombs can be embedded within <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">Trojan horses<\/a>.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"3\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Email attachments may come with the logic bombs malware so be extra careful when opening email attachments.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"4\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Implement patches to all the software installed on the computer whenever there is a release.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"5\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Never visit untrusted web links because clicking on an unsafe link may direct you to an infected website.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"6\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Install a robust antivirus program like Comodo Antivirus because it easily detects malware such as Trojan horses.<\/li>\n<\/div>\n<\/div>\n<\/ul>\n<\/div>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/coronavirus-push-lokibot-trojan-malware-unsuspecting-users\/\">Coronavirus Malware Cybercrime Campaigns<\/a><\/p>\n<p><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"blank\" target=\"_blank\">antivirus software<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">Wikipedia DDOS Attack<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\">Best Virus Removal<\/a><\/p>\n<p><strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus-for-mac.php\" target=\"_blank\">Mac Virus Removal<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" rel=\"noopener nofollow\" target=\"_blank\">Free Website Hosting<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" rel=\"noopener\" target=\"_blank\">Website Vulnerability Scanner<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\">Website Malware Scanner<\/a><\/strong><br \/>\n&nbsp;<\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/itsm-cloud-solutions.php\" rel=\"noopener\" target=\"_blank\">ITSM Cloud Solutions<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term logic bomb refers to the malware also called slag code which gets activated by a response to an event. For instance, launching an application or when a specific date\/time is reached \u2013 it triggers the logic bomb malware to start running on a computer. Online fraudsters make use of the logic bomb malware [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":5580,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[12,25,266,199],"class_list":["post-5578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comodo-news","tag-antivirus-software","tag-cyber-criminals","tag-logic-bomb","tag-malware-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?<\/title>\n<meta name=\"description\" content=\"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?\" \/>\n<meta property=\"og:description\" content=\"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-21T10:34:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-16T14:16:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/\",\"name\":\"What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png\",\"datePublished\":\"2018-11-21T10:34:40+00:00\",\"dateModified\":\"2025-06-16T14:16:48+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png\",\"width\":225,\"height\":170,\"caption\":\"What is Logic Bomb\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Logic Bomb?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?","description":"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/","og_locale":"en_US","og_type":"article","og_title":"What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?","og_description":"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.","og_url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-11-21T10:34:40+00:00","article_modified_time":"2025-06-16T14:16:48+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/","url":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/","name":"What is a Logic Bomb? | How to Prevent this Logic Bomb Malware?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png","datePublished":"2018-11-21T10:34:40+00:00","dateModified":"2025-06-16T14:16:48+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Logic Bomb is a malware otherwise known as slag code that triggers an event to steal user data. Prevent logic bombs from infecting PC using antivirus.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/11\/what-is-logic-bomb.png","width":225,"height":170,"caption":"What is Logic Bomb"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/logic-bomb\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Logic Bomb?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=5578"}],"version-history":[{"count":30,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5578\/revisions"}],"predecessor-version":[{"id":21881,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/5578\/revisions\/21881"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/5580"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=5578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=5578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=5578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}