{"id":6206,"date":"2019-01-23T16:25:44","date_gmt":"2019-01-23T10:55:44","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=6206"},"modified":"2021-02-24T13:42:03","modified_gmt":"2021-02-24T08:12:03","slug":"trojan-horse-definition","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/","title":{"rendered":"What is a Trojan Horse Virus? \u2013 Definition"},"content":{"rendered":"<div itemscope itemtype=\"http:\/\/schema.org\/ImageObject\"><meta itemprop=\"name\" content=\"Trojan Horse Definition\"><img decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/Trojan-Horse-Definition.png\" class=\"img-responsive\" alt=\"Trojan Horse Definition\" itemprop=\"contentUrl\"\/><meta itemprop=\"datePublished\" content=\"2019-01-23\"><meta itemprop=\"description\" content=\"Trojan Horse is a malware type that gets disguised into a legitimate software and are used by hackers to steal personal user information.\"><\/div>\n<p>A <strong>Trojan horse<\/strong> or <strong>Trojan<\/strong> is a kind of malware that frequently changed as authentic software. Unlike computer worms and viruses, Trojans are not able to self-replicate. Hackers and cyber-thieves who try to gain access to a user\u2019s system use Trojans. Users fall for some form of social engineering and accidentally load and execute Trojans onto their systems. After the activation process, Trojans allow cybercriminals to spy on the users, steal their personal data, and gain backdoor access to their system.<\/p>\n<h2>Top 5 Actions of Trojan Horse Virus<\/h2>\n<p>These actions can include:<br \/>\n&nbsp;<\/p>\n<ul>\n<li>Blocking data<\/li>\n<li>Deleting data<\/li>\n<li>Copying data<\/li>\n<li>Modifying data<\/li>\n<li>Disrupting the performance of computer networks or computers<\/li>\n<\/ul>\n<h2>Types of Trojan Viruses<\/h2>\n<p>Some of the key Trojan varieties include:<br \/>\n&nbsp;<\/p>\n<ul>\n<li><strong>Trojan-Banker<\/strong><br \/>\nThis Trojan has been designed for stealing account data for online banking systems, debit and credit cards.<\/li>\n<li><strong>Rootkit<\/strong><br \/>\nThis is a sophisticated type of Trojan capable of providing remote control of a victim&#8217;s device to the cybercriminal. These Trojans allow the victim&#8217;s device to be used as part of a botnet.<\/li>\n<li><strong>Trojan-FakeAV<\/strong><br \/>\nThis Trojan horse program misrepresents the security status of a computer. These programs convince the user to purchase software in order to remove non-existent malware or security risks from the computer. They continually prompt users to pay for the software using their credit cards. Some programs make use of strategies designed to disrupt or irritate the activities of the user until the software is purchased.<\/li>\n<li><strong>Trojan-Ransomware<\/strong><br \/>\nThis is a type of Trojan that prevents a device from functioning properly. It encrypts data and then demands a ransom for the decrypting code.<\/li>\n<li><strong>Trojan-Spy<\/strong><br \/>\nTrojan-Spy programs spy on how you go about using your computer. For instance, these programs track the data you enter through your keyboard by getting a list of running applications or taking screenshots.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><strong>How Does a Trojan Horse Work?\u00a0<\/strong><\/h2>\n<p>Let\u2019s understand the workings of a Trojan horse virus through an example of how a Trojan horse could have been used to infect a personal computer:<\/p>\n<p>First, the victim receives an official-looking email with an attachment. This attachment contains malicious code that gets executed immediately after the victim clicks on the attachment. The victim does not experience anything bad because the computer continues to work as expected. The victim does not even suspect that the attachment is, in fact, a Trojan horse that has successfully infected the victim\u2019s computing device.<\/p>\n<p>The malicious code continues to remain undetected until a specific date or until the time when the victim executes a specific action, like visiting a banking website. When this takes place, the trigger goes ahead and activates the malicious code and executes its planned action. Based on how the Trojan has been developed, it may delete itself after executing its proposed function, it may continue to be active or it may return to a dormant state.<br \/>\n&nbsp;<\/p>\n<h2><strong>How to Protect Computer from Trojan Horse Virus?\u00a0<\/strong><\/h2>\n<p>Protect your computer against Trojan attacks by installing Comodo <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">Antivirus<\/a> that is packed with remarkable security features making it one of the best antivirus software in the IT security industry. This software will help in successfully protecting your computers against Trojan horses, worms, spyware, viruses, rootkits, adware, backdoor malware, and several other malware infections, including the most dangerous zero-day threats.<\/p>\n<p>Comodo&#8217;s virus protection technology has established its strength for battling virus threats via tried-and-tested methods. Infection Defense blocks the access of any doubtful programs at all critical checkpoints, while the Auto-Sandbox Techniques are capable of isolating the potentially harmful programs in a restricted environment without allowing it to affect your workflow.<\/p>\n<p>Comodo <a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"_blank\" rel=\"noopener\">Antivirus Software<\/a> features the Default Deny Protection, which denies access to a program if it is not in Comodo&#8217;s comprehensive whitelist. The cloud-aware security features are light on the system and provide regular virus scanning and behavior analysis report.<br \/>\n&nbsp;<\/p>\n<h3><strong>How Comodo Antivirus Features Helps to Defend Against Trojan Virus?<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Host Intrusion Prevention System (HIPS):<\/strong> This system comprehensively monitors your system and prevent malicious attacks from entering it. It employs a &#8216;set of behavior analyzers&#8217; to execute the search.<\/li>\n<li><strong>VirusScope:<\/strong> This is another technology that is useful for local PC analysis. It helps PC users to undo malicious-looking changes which PC(s) might have recorded due to malicious actors.<\/li>\n<li><strong>Cloud-based Behavior Analysis \u2013 Valkyrie:<\/strong> With the increase in zero-day malware, the need for a cloud-based behavior analysis system capable of keeping up with the latest malware is quite critical.<\/li>\n<li><strong>Efficient Whitelisting:<\/strong> This feature marks specific files as trustworthy and gives them default access.<\/li>\n<li><strong>Default Deny Approach:<\/strong> This unique approach adopted by Comodo prevents all files by default from entering the system until they prove themselves to be harmless.<\/li>\n<li><strong>Containment:<\/strong> This technology backs default deny approach by &#8216;containing&#8217; or &#8216;restraining&#8217; files and then running them in a separate environment, until they prove themselves to be harmless, without affecting your computer\u2019s security.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resource<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/coronavirus-push-lokibot-trojan-malware-unsuspecting-users\/\">Coronavirus Themed Emails<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"_blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"_blank\" rel=\"noopener\">Antivirus for Android<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/virus-protection.php\" target=\"_blank\" rel=\"noopener\">Virus Protection<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/best-antivirus-software-for-windows-7\/\">Best antivirus software for windows 7<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"blank\" rel=\"noopener\">Website Status<\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\" target=\"blank\" rel=\"noopener\">WordPress Security<\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" target=\"blank\" rel=\"noopener\">Website Backup<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" target=\"blank\" rel=\"noopener\">Website Vulnerability Scanner<\/a><\/p>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"blank\">Website Malware Scanner<\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/itsm-system-open-source.php\" rel=\"noopener\" target=\"_blank\">ITSM System Open Source<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A Trojan horse or Trojan is a kind of malware that frequently changed as authentic software. Unlike computer worms and viruses, Trojans are not able to self-replicate. Hackers and cyber-thieves who try to gain access to a user\u2019s system use Trojans. Users fall for some form of social engineering and accidentally load and execute Trojans [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":6216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[209,235,253],"class_list":["post-6206","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","tag-trojan","tag-trojan-horse","tag-zeus-trojan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Trojan Horse? How it works? | Trojan Virus Definition<\/title>\n<meta name=\"description\" content=\"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Trojan Horse? How it works? | Trojan Virus Definition\" \/>\n<meta property=\"og:description\" content=\"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T10:55:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T08:12:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\",\"name\":\"What is a Trojan Horse? How it works? | Trojan Virus Definition\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png\",\"datePublished\":\"2019-01-23T10:55:44+00:00\",\"dateModified\":\"2021-02-24T08:12:03+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png\",\"width\":225,\"height\":170,\"caption\":\"What is Trojan Horse\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Trojan Horse Virus? \u2013 Definition\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Trojan Horse? How it works? | Trojan Virus Definition","description":"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/","og_locale":"en_US","og_type":"article","og_title":"What is a Trojan Horse? How it works? | Trojan Virus Definition","og_description":"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.","og_url":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-01-23T10:55:44+00:00","article_modified_time":"2021-02-24T08:12:03+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/","url":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/","name":"What is a Trojan Horse? How it works? | Trojan Virus Definition","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png","datePublished":"2019-01-23T10:55:44+00:00","dateModified":"2021-02-24T08:12:03+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"A Trojan horse virus is a trick that shields malware. Find out what a Trojan Virus is and how to identify and defend upon this unreliable set of attacks.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Trojan-Horse.png","width":225,"height":170,"caption":"What is Trojan Horse"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Trojan Horse Virus? \u2013 Definition"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=6206"}],"version-history":[{"count":24,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6206\/revisions"}],"predecessor-version":[{"id":15885,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6206\/revisions\/15885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/6216"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=6206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=6206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=6206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}