{"id":7689,"date":"2019-04-18T17:30:41","date_gmt":"2019-04-18T12:00:41","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=7689"},"modified":"2025-06-13T17:21:20","modified_gmt":"2025-06-13T11:51:20","slug":"worm-virus","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/","title":{"rendered":"What is a Worm Virus?"},"content":{"rendered":"<p>A <strong>worm virus<\/strong> is a type of malware that clones itself throughout a network without any user interference. The modus operandi of <a href=\"https:\/\/antivirus.comodo.com\/blog\/how-to\/trojan-horse-definition\/\" rel=\"noopener\" target=\"_blank\">Trojan horse<\/a> is like virus in causing damage to the system. It exploits the vulnerability found in outdated security software to successfully steal confidential data, corrupt applications, files and other programs. It also creates a backdoor to gain remote access to the infected system.<\/p>\n<div>\n<div itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n<meta itemprop=\"name\" content=\"Worm Virus\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2019\/10\/worm-virus.png\" class=\"img-responsive\" alt=\"Worm Virus\" itemprop=\"contentUrl\"\/><br \/>\n<meta itemprop=\"datePublished\" content=\"2019-10-31\"><br \/>\n<meta itemprop=\"description\" content=\"A Worm Virus is a self-replicating malicious program which can spread through a network without any human intervention. Remove Worm Virus using antivirus.\">\n<\/div>\n<\/div>\n<p>A worm uses large amount of computer memory. Therefore, the servers, networks and devices that are infected by worms gets overloaded and stop to respond. Unlike other viruses, worms operate all by themselves and don\u2019t require any host computer. The infection is transmitted through data transport features, email attachments, file-sharing networks, etc. Once worms get downloaded, they exploit the security weakness found in any of the outdated software on the device. In certain cases, worms use an attractive phishing element as a bait to trick users and run the malware code.<\/p>\n<h2>How Worm Virus Work and Infect your Computers?<\/h2>\n<p>Worms are passed on to the targeted system through software vulnerabilities. Hackers send phishing emails or instant messages with malicious attachments. When the user opens the attachment or the link, it instantly downloads the malware (worm) into the system or gets directed to malicious website. By this way the worm finds its way to enter into the system without the user\u2019s knowledge.<\/p>\n<p>Worms can alter and remove files and can also infect the system with any other new malware on your computer. Some types of worms are created to occupy the entire system resources and therefore overloading the shared network. In addition to exhausting the system resources, the computer worm allows hackers to open a backdoor and enables them to take complete control over the system.<\/p>\n<h2>How do you know that your computer is infected with worms?<\/h2>\n<p>If you suspect that your system is infected<\/p>\n<ul>\n<li>Run a virus scan<\/li>\n<li>Check hard disk memory space \u2013 as worms replicate self-copies and use up the available space.<\/li>\n<li>Monitor the system performance. In case if your system shows up a very slow performance it\u2019s certainly a red flag. (<a href=\"https:\/\/hungryenoughtoeatsix.com\/ordering-clonazepam-from-canadian-pharmacy\/\">https:\/\/hungryenoughtoeatsix.com\/<\/a>) <\/li>\n<li>Check if you are getting any random pop-ups.<\/li>\n<li>Check if there are any missing files\u2013 as computer worms delete user\u2019s files and replace the space of the deleted files with malicious files.<\/li>\n<\/ul>\n<div itemtype=\"https:\/\/schema.org\/ItemList\">\n<h2 itemprop=\"name\">How to Stay Protected from Worm Virus?<\/h2>\n<p itemprop=\"description\" >The rate of malware infections has gone high and hackers have evolved over time with new sophisticated attack methods Here are a few security tips to protect yourself against computer worms.<\/p>\n<ol itemprop=\"itemListOrder\" href=\"https:\/\/schema.org\/ItemListOrderAscending\">\n<meta itemprop=\"numberOfItems\" content=\"6\" \/><\/p>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"1\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Install an effective <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\" target=\"_blank\" rel=\"noopener\">virus protection<\/a> software like antivirus and <a href=\"https:\/\/personalfirewall.comodo.com\/what-is-firewall.html\" target=\"_blank\" rel=\"noopener\">firewall<\/a> is critical.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"2\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Keep a track of the possible data exfiltration.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"3\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Automate notifications to send alert once malware or any other suspicious files are detected.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"4\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Keep a track of the behavior of the files and users.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"5\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Update software with the latest security patches.<\/li>\n<\/div>\n<\/div>\n<div itemprop=\"itemListElement\" itemscope itemtype=\"https:\/\/schema.org\/ListItem\">\n<span itemprop=\"position\" content=\"6\" \/><\/p>\n<div itemprop=\"item\" itemscope itemtype=\"https:\/\/schema.org\/thing\">\n<li itemprop=\"name\">Be wary of suspicious emails that can trick you to click on malicious attachments and links and therefore become a victim of identity theft.<\/li>\n<\/div>\n<\/div>\n<\/ol>\n<\/div>\n<p>Comodo Antivirus offers best-in-class virus protection features to deny threats completely. It offers <a href=\"https:\/\/antivirus.comodo.com\/free-antivirus.php\">antivirus solutions<\/a> to protect Windows and Android devices, To learn more about the product, check our official page and stay protected.<\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-free-spyware-removal-software\/\">Spyware Removal<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources:<\/strong><\/p>\n<p><strong><a href=\"https:\/\/www.comodo.com\/home\/internet-security\/antivirus.php\" target=\"blank\" target=\"_blank\">Antivirus Software<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-antivirus-of-2019\/\" target=\"blank\">Best Antivirus<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/antivirus-for-android.php\" target=\"blank\">Antivirus for Android<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\" target=\"blank\">Virus Protection<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" target=\"blank\" target=\"_blank\">Website Vulnerability Scanner<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/perform-website-safety-check.php\" rel=\"noopener\" target=\"_blank\">Website Safety Check<\/a><\/strong><br \/>\n&nbsp;<\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/what-is-patch-management-in-linux.php\" rel=\"noopener\" target=\"_blank\">What Is Patch Management In Linux<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A worm virus is a type of malware that clones itself throughout a network without any user interference. The modus operandi of Trojan horse is like virus in causing damage to the system. It exploits the vulnerability found in outdated security software to successfully steal confidential data, corrupt applications, files and other programs. It also [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[9,63,198],"class_list":["post-7689","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus","tag-free-antivirus","tag-worm-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is a Worm Virus? | How Does it Work to Infect Computer?<\/title>\n<meta name=\"description\" content=\"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Worm Virus? | How Does it Work to Infect Computer?\" \/>\n<meta property=\"og:description\" content=\"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-18T12:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-13T11:51:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\",\"name\":\"What is a Worm Virus? | How Does it Work to Infect Computer?\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"datePublished\":\"2019-04-18T12:00:41+00:00\",\"dateModified\":\"2025-06-13T11:51:20+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg\",\"width\":350,\"height\":282,\"caption\":\"Computer Worm\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Worm Virus?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Worm Virus? | How Does it Work to Infect Computer?","description":"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/","og_locale":"en_US","og_type":"article","og_title":"What is a Worm Virus? | How Does it Work to Infect Computer?","og_description":"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2019-04-18T12:00:41+00:00","article_modified_time":"2025-06-13T11:51:20+00:00","og_image":[{"width":350,"height":282,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/","name":"What is a Worm Virus? | How Does it Work to Infect Computer?","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","datePublished":"2019-04-18T12:00:41+00:00","dateModified":"2025-06-13T11:51:20+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"A worm virus is a type of malware that clones itself throughout a network without any user interference. This computer worm spreads from one PC to another.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/computer-fraudster.jpg","width":350,"height":282,"caption":"Computer Worm"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/worm-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Worm Virus?"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=7689"}],"version-history":[{"count":22,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7689\/revisions"}],"predecessor-version":[{"id":21811,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/7689\/revisions\/21811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/437"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=7689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=7689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=7689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}