{"id":3966,"date":"2024-11-05T20:11:23","date_gmt":"2024-11-05T20:11:23","guid":{"rendered":"https:\/\/digitalinvestigation.com\/blog\/?p=3966"},"modified":"2024-12-13T13:36:03","modified_gmt":"2024-12-13T13:36:03","slug":"how-can-you-protect-yourself-from-social-engineering","status":"publish","type":"post","link":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/","title":{"rendered":"How Can You Protect Yourself from Social Engineering"},"content":{"rendered":"<p>It may not sound like much but many people need to learn how can you protect yourself from social engineering.<\/p>\n<p>This is because social engineering is at the heart of any scam online. It\u2019s what truly drives most <a href=\"https:\/\/digitalinvestigation.com\/blog\/dating-scam\/extortion-scams-on-dating-sites\/\">cases of extortion<\/a>, <a href=\"https:\/\/digitalinvestigation.com\/blog\/blackmail\/how-to-deal-with-social-media-blackmail\/\">blackmail<\/a>, harassment, stalking and more. In fact, without it most of the above crimes would not exist today.<\/p>\n<p>To protect yourself from social engineering you should never give out your information online to anyone. And this means never anything at all. In this type of crime people can engineer information together to complete a whole profile and steal what they want.<\/p>\n<p>You see, even just a little piece of information can go a long way to a cyber-criminal. And, think about this. If they know what car you drive, around where you live, where you hang out, what you like to eat etc.<\/p>\n<p>They may have just enough information to steal and extort someone online.<\/p>\n<p>You must be careful on all websites today from Bumble to Facebook.\u00a0 Cyber criminals are all over the internet just waiting to steal your information.<\/p>\n<p>The General Rule is, if you do not know them, do not tell them anything, ever!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Criminals_Find_People_Online\"><\/span>How Criminals Find People Online<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There was a study done by a police officer in Canada who was part of online forensics investigation. By befriending a young woman online and gaining only basic information, he was able to figure out her address.<\/p>\n<p>Social engineering takes on many forms with chat or messenger applications such as on Facebook or other websites. Many times, the they will flat out ask you for your information or they will pretend to be the opposite sex to gain your trust.<\/p>\n<p>Then they will ask you for your Gmail address or chat username. Once they have this information they can use it against you.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Social_Engineering_Really_Is\"><\/span>What Social Engineering Really Is<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Social engineering is a fancy term for someone who is just piecing together information in an attempt to strike when they have enough information.<\/p>\n<p>It may take a scammer a while to build a full information profile. But, once they do, they have everything needed to strike a victim.<\/p>\n<p>Social engineering does not have to involve fancy equipment. It can be done over the telephone easily.<\/p>\n<p>This is how it works on a phone. The is trying to gain information about a person so they can steal their information and use it against them.<\/p>\n<p>All they must do is call the household of the victim, talk to someone in the house with a made-up story about being a computer repairman.<\/p>\n<p>They would then persuade the person to unlock their computer with social engineering.<\/p>\n<p>Once they have access to their computer, they are free to go through files and find whatever they can use against the person.<\/p>\n<p>H3 &#8211; Protecting Yourself and Your Family<\/p>\n<p>Never give out any personal information to anyone under any circumstances whether on the phone, using a computer or in person.<\/p>\n<p>Always instruct family members to never give out any information to anyone ever! This includes, on the phone, online or in any chat program.<\/p>\n<p>Information theft is big business online. Criminals steal information for huge paydays.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Can_You_Get_Help_If_You_Already_Gave_Out_Your_Info\"><\/span>Can You Get Help If You Already Gave Out Your Info?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Yes, you absolutely can.<\/p>\n<p>Digital Forensics is always standing by, ready to help you.<\/p>\n<p>How does Digital Forensics help?<\/p>\n<p>We help by taking away what protects the criminal most. We take away their anonymity and expose them quickly. This leaves them feeling vulnerable and at this point they do not even care about you any longer.<\/p>\n<p>Once we expose them, we then work with local authorities to put them out of business fast!<\/p>\n<p>We have worked hard to develop technology that exposes these scammers and you can only get it at Digital Forensics Corp.<\/p>\n","protected":false},"excerpt":{"rendered":"It may not sound like much but many people need to learn how can you protect yourself from&hellip;","protected":false},"author":4,"featured_media":4478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-3966","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-online-harassment","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.8 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Can You Protect Yourself from Social Engineering | Blog<\/title>\n<meta name=\"description\" content=\"How Can You Protect Yourself from Social Engineering | Blog\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Can You Protect Yourself from Social Engineering\" \/>\n<meta property=\"og:description\" content=\"How Can You Protect Yourself from Social Engineering | Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PDInvestigate\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T20:11:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-13T13:36:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Todd Jirecek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:site\" content=\"@PDInvestigate\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Todd Jirecek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/\"},\"author\":{\"name\":\"Todd Jirecek\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/1457a3e6e40cbed25472750df30b2416\"},\"headline\":\"How Can You Protect Yourself from Social Engineering\",\"datePublished\":\"2024-11-05T20:11:23+00:00\",\"dateModified\":\"2024-12-13T13:36:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg\",\"articleSection\":[\"Harassment Prevention\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/\",\"name\":\"How Can You Protect Yourself from Social Engineering | Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg\",\"datePublished\":\"2024-11-05T20:11:23+00:00\",\"dateModified\":\"2024-12-13T13:36:03+00:00\",\"description\":\"How Can You Protect Yourself from Social Engineering | Blog\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/11\\\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg\",\"width\":1600,\"height\":560,\"caption\":\"Advice on protecting yourself from social engineering attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/online-harassment\\\/how-can-you-protect-yourself-from-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Can You Protect Yourself from Social Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"name\":\"Articles on Sextortion & Blackmail - Expert Advice on the Blog\",\"description\":\"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less\",\"publisher\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#organization\",\"name\":\"Digital Investigations\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"contentUrl\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/digital-investigation-logo.png\",\"width\":216,\"height\":65,\"caption\":\"Digital Investigations\"},\"image\":{\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PDInvestigate\",\"https:\\\/\\\/x.com\\\/PDInvestigate\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/digitalinvestigation\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCc5KctfM3-tMserIsMhWUrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/digitalinvestigation.com\\\/blog\\\/#\\\/schema\\\/person\\\/1457a3e6e40cbed25472750df30b2416\",\"name\":\"Todd Jirecek\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Can You Protect Yourself from Social Engineering | Blog","description":"How Can You Protect Yourself from Social Engineering | Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/","og_locale":"en_US","og_type":"article","og_title":"How Can You Protect Yourself from Social Engineering","og_description":"How Can You Protect Yourself from Social Engineering | Blog","og_url":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/","og_site_name":"Articles on Sextortion &amp; Blackmail - Expert Advice on the Blog","article_publisher":"https:\/\/www.facebook.com\/PDInvestigate","article_published_time":"2024-11-05T20:11:23+00:00","article_modified_time":"2024-12-13T13:36:03+00:00","og_image":[{"width":1600,"height":560,"url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg","type":"image\/jpeg"}],"author":"Todd Jirecek","twitter_card":"summary_large_image","twitter_creator":"@PDInvestigate","twitter_site":"@PDInvestigate","twitter_misc":{"Written by":"Todd Jirecek","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#article","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/"},"author":{"name":"Todd Jirecek","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/1457a3e6e40cbed25472750df30b2416"},"headline":"How Can You Protect Yourself from Social Engineering","datePublished":"2024-11-05T20:11:23+00:00","dateModified":"2024-12-13T13:36:03+00:00","mainEntityOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/"},"wordCount":644,"publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg","articleSection":["Harassment Prevention"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/","url":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/","name":"How Can You Protect Yourself from Social Engineering | Blog","isPartOf":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg","datePublished":"2024-11-05T20:11:23+00:00","dateModified":"2024-12-13T13:36:03+00:00","description":"How Can You Protect Yourself from Social Engineering | Blog","breadcrumb":{"@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#primaryimage","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2024\/11\/DI_Blog_How_Can-You_Protect_Yourself_from_Social_Engineering_1600x560px.jpg","width":1600,"height":560,"caption":"Advice on protecting yourself from social engineering attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/digitalinvestigation.com\/blog\/online-harassment\/how-can-you-protect-yourself-from-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digitalinvestigation.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Can You Protect Yourself from Social Engineering"}]},{"@type":"WebSite","@id":"https:\/\/digitalinvestigation.com\/blog\/#website","url":"https:\/\/digitalinvestigation.com\/blog\/","name":"Articles on Sextortion & Blackmail - Expert Advice on the Blog","description":"Expert Advice on Sextortion &amp; Blackmail in Articles from Digital Investigators. Stop Being a Victim. Learn How To Mitigate The Situation In 24h Or Less","publisher":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digitalinvestigation.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/digitalinvestigation.com\/blog\/#organization","name":"Digital Investigations","url":"https:\/\/digitalinvestigation.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","contentUrl":"https:\/\/digitalinvestigation.com\/blog\/wp-content\/uploads\/2022\/05\/digital-investigation-logo.png","width":216,"height":65,"caption":"Digital Investigations"},"image":{"@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PDInvestigate","https:\/\/x.com\/PDInvestigate","https:\/\/www.linkedin.com\/company\/digitalinvestigation","https:\/\/www.youtube.com\/channel\/UCc5KctfM3-tMserIsMhWUrg"]},{"@type":"Person","@id":"https:\/\/digitalinvestigation.com\/blog\/#\/schema\/person\/1457a3e6e40cbed25472750df30b2416","name":"Todd Jirecek"}]}},"_links":{"self":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3966","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/comments?post=3966"}],"version-history":[{"count":5,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3966\/revisions"}],"predecessor-version":[{"id":4300,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/posts\/3966\/revisions\/4300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media\/4478"}],"wp:attachment":[{"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/media?parent=3966"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/categories?post=3966"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalinvestigation.com\/blog\/wp-json\/wp\/v2\/tags?post=3966"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}