{"id":6391,"date":"2019-10-08T02:02:52","date_gmt":"2019-10-07T20:32:52","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=6391"},"modified":"2021-02-24T13:22:04","modified_gmt":"2021-02-24T07:52:04","slug":"computer-worm-definition","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/","title":{"rendered":"Computer Worm Definition and Types. How to Prevent them?"},"content":{"rendered":"<h2><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6396\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/Computer-Worm-Definition.png\" alt=\"Computer Worm Definition\" width=\"650\" height=\"300\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/Computer-Worm-Definition.png 650w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/Computer-Worm-Definition-300x138.png 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/Computer-Worm-Definition-225x104.png 225w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><br \/>\nWhat is Computer Worm?<\/h2>\n<p>A <dfn>computer worm<\/dfn> is a type of malicious software program which infects other systems by making multiple copies of itself and spreading itself onto other computers within the network. Computer worms exploit certain parts of the operating system that are not visible to the user. The infection is only noticed when the system consumes most of the resources due to the worm\u2019s uncontrolled replication. This in turn slows and stops the performance of other services in the computer\u2019s operating system.<\/p>\n<h2>How Computer Worms Spread?<\/h2>\n<p>Malware engineers develop computer worms to spread infection without any human intervention. It is all set to start the attack, when it becomes active on the infected system. Primitively, the worms spread i through storage media, floppy discs, which when inserted onto the disc space would then activate and then start infecting other storage devices connected to the target system. This is why USBs are often the delivery mechanisms for computer worms.<\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p>Computer worms propagate through the existing vulnerabilities in the network. For instance, the WannaCry ransomware worm infected systems with Windows installs that had a vulnerability in the first version of the Server Message Block resource sharing protocol.<\/p>\n<p>A <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\">worm virus<\/a> establishes itself in a host system and stays active on a newly infected computer, the malware then starts a network search for possible new storage devices to infect Through this way the worm is able to multiply and spread its infection to all interconnected devices in a network. When the Wannacry ransomware infects bring your own device or BYOD, the worm can spread itself onto other systems that might be connected to the infected network. Worms that are associated through emails can spread its infection by generating and sending emails to all the other addresses of the user\u2019s address book.<\/p>\n<h2>Types of computer worms<\/h2>\n<p>Computer worms multiply themselves in a bid to spread infection to all other networks that share a connection to their host systems. Due to the propagation of the computer worms the infected system suffers latency or disruption in services. The worm propagation saturates the network links with malicious traffic and therefore disrupts networking.<\/p>\n<p>Most often, a computer worm is either a worm hybrid or a virus \u2013 it not just spreads the infection but also modifies the software code. Else it performs to encrypt the users\u2019 files and demands a ransom to gain back access to the files.<\/p>\n<p>In some cases, hackers create bot worms to infect the victim computers and then to convert them into <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/botnet-definition\/\" target=\"_blank\" rel=\"noopener\">botnets<\/a> or zombies. These zombies are then used in botnets-based attacks by integrating infected systems under one network.<\/p>\n<p>IM (instant messaging) worms multiply and spread through instant messaging systems and gain access to the address book on the victim\u2019s system.<\/p>\n<p>Email worms come in the form of links or attachments of emails that appear to be genuine. Malware engineers craft email worms to send themselves as attachments in to the email addresses in the contact lists of an infected account. When the recipients open the infected attachment or the file, the worm infects the recipients\u2019 system. Email worms deploy the use of effective social engineering methods to prompt the users to open the attached infected file.<\/p>\n<p>An ethical worm is a crafted by hackers to multiply and spread across the network to deliver patches for known security vulnerabilities. When there is a change in the program code due to the patch fix, it can cause unexpected changes and the system which sometimes opens the publisher to numerous criminal and civil charges.<br \/>\n&nbsp;<\/p>\n<h2>How to Detect, Prevent and Removal a Computer Worm?<\/h2>\n<ul>\n<li>Users should follow effective cyber security practice to fight against infected with computer worms.<\/li>\n<li>Keep software up-to-date with the latest security patch fixes<\/li>\n<li>Implement the use of firewalls to mitigate system access by malicious software.<\/li>\n<li>Use <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener\">antivirus software<\/a> to prevent malicious software from running in the system.<\/li>\n<li>Avoid clicking on suspicious links and attachments which can expose your systems to malware.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div itemtype=\"https:\/\/schema.org\/ItemList\">\n<h2 itemprop=\"name\">Symptoms of Computer Worms<\/h2>\n<ol itemprop=\"itemListOrder\" href=\"https:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"4\" \/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\"\/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\"> Slow performance of the computer<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"2\"\/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Unexpected freezing and crashing of system<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"3\"\/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Annoying pop-ups<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<meta itemprop=\"position\" content=\"4\"\/> <\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Blue screen of death<\/li>\n<\/div>\n<\/div>\n<\/ol>\n<\/div>\n<p>Removing a computer worm can be challenging. In worst cases, network administrators will have to reformat the system and reinstall software. Users need to use an effective <a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/5-best-free-malware-removal-tools-2019\/\" target=\"_blank\" rel=\"noopener\">malware removal tool<\/a> to identify and remove the worm. When removing the worm, users and administrators should disconnect the system from the Internet to make sure the malicious program does not escape to another device or system.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\">Types of Computer Virus<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&amp;track=16678&amp;af=16678\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\" \/><\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/\" target=\"blank\">https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-a-computer-virus\/<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">DDoS Attack Forces Wikipedia Offline<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-windows-7\/\" target=\"blank\" rel=\"noopener\">Windows Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/comodo-news\/best-antivirus-windows-pc-2019\/\" target=\"blank\" rel=\"noopener\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener\">Free Website Malware Scanner<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/free-web-vulnerability-scanner-tools\/\" target=\"_blank\" rel=\"noopener\">Website Vulnerability Scanner<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" rel=\"noopener\" target=\"_blank\">Free Website Hosting<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/open-source-inventory-management.php\" rel=\"noopener\" target=\"_blank\">Open Source Inventory Management<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Computer Worm? A computer worm is a type of malicious software program which infects other systems by making multiple copies of itself and spreading itself onto other computers within the network. Computer worms exploit certain parts of the operating system that are not visible to the user. The infection is only noticed when [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":6401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[165,164,208],"class_list":["post-6391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-computer-virus","tag-computer-worm","tag-types-of-computer-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Computer Worm Definition | Types of Computer Worm and How its Works<\/title>\n<meta name=\"description\" content=\"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Computer Worm Definition | Types of Computer Worm and How its Works\" \/>\n<meta property=\"og:description\" content=\"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-07T20:32:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T07:52:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"170\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/\",\"name\":\"Computer Worm Definition | Types of Computer Worm and How its Works\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png\",\"datePublished\":\"2019-10-07T20:32:52+00:00\",\"dateModified\":\"2021-02-24T07:52:04+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png\",\"width\":225,\"height\":170,\"caption\":\"What is Computer Worm?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Computer Worm Definition and Types. How to Prevent them?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Computer Worm Definition | Types of Computer Worm and How its Works","description":"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/","og_locale":"en_US","og_type":"article","og_title":"Computer Worm Definition | Types of Computer Worm and How its Works","og_description":"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-10-07T20:32:52+00:00","article_modified_time":"2021-02-24T07:52:04+00:00","og_image":[{"width":225,"height":170,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png","type":"image\/png"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/","name":"Computer Worm Definition | Types of Computer Worm and How its Works","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png","datePublished":"2019-10-07T20:32:52+00:00","dateModified":"2021-02-24T07:52:04+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Computer Worm is defined as the type of malware worm that spreads from one computer to another computer by duplicating itself and often not visible to user.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/01\/What-is-Computer-Worm.png","width":225,"height":170,"caption":"What is Computer Worm?"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/computer-worm-definition\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Computer Worm Definition and Types. How to Prevent them?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=6391"}],"version-history":[{"count":34,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6391\/revisions"}],"predecessor-version":[{"id":15873,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/6391\/revisions\/15873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/6401"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=6391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=6391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=6391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}