{"id":26725,"date":"2023-04-17T16:57:46","date_gmt":"2023-04-17T08:57:46","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=26725"},"modified":"2023-06-22T10:30:07","modified_gmt":"2023-06-22T02:30:07","slug":"dont-fall-for-phishing-scam-emails","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/dont-fall-for-phishing-scam-emails\/","title":{"rendered":"Don&#8217;t Fall for Phishing Scam Emails: Learn to Spot and Avoid Phishing Attempts\u00a0"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-26758 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=696%2C364&#038;ssl=1\" alt=\"Phishing scam, email scam especially domain renewal reminder email\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?resize=803%2C420&amp;ssl=1 803w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?w=1200&amp;ssl=1 1200w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.exabytes.sg\/blog\/you-got-phished-phishing-emails-and-what-are-they\/\">Phishing emails<\/a> are deceptive attempts to acquire sensitive information, such as passwords and credit card numbers. They appear to be from a reputable company, but they are actually from scammers attempting to deceive you. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you fall victim to a <a href=\"https:\/\/www.exabytes.sg\/blog\/what-is-phishing\/\">phishing scam<\/a>, the scammers can use your information to make fraudulent purchases, steal your identity, and more. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, there are methods to recognise and avoid phishing attempts. Keep reading to learn how to avoid these scammers.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<h2><b>What is a Phish?<\/b><span style=\"font-weight: 400;\">\u00a0\u00a0\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Understanding what a phishing email is is the first step to recognise one. The definition of a phishing email is an email sent with the ill intent of convincing the recipient to perform a specific action. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The perpetrator may employ social engineering techniques to make their email appear authentic and request sensitive information such as login credentials and passwords.\u00a0\u00a0<\/span><\/p>\n<h3><b>Socially Engineered Phishing Emails<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing emails with social engineering are the most dangerous. They are designed to be relevant to their objectives and appear authentic. The recipient is more receptive to the email and completes the specific task requested. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The outcomes may be catastrophic. If the recipient visits a malware-infected website, opens an attachment with a malicious payload, or discloses their login credentials, a scammer can gain unauthorised access to a corporate network.<\/span><\/p>\n<h2><b>How to Identify Phishing Emails<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Oftentimes, phishing emails share common characteristics; they are frequently designed to elicit emotions such as curiosity, sympathy, dread, and greed. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a team is informed of these characteristics and instructed on what to do when a threat is suspected, the time invested in training a team to recognise phishing emails can thwart a scammer&#8217;s attacks and network infiltration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Knowing how to identify phishing emails will prevent you from becoming a victim.\u00a0\u00a0<\/span><\/p>\n<h3><b>1. Emails Demanding Immediate Action<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Emails that threaten a negative consequence or opportunity loss unless immediate action is taken are frequently fraudulent. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is a common tactic employed by scammers to induce recipients to act before they have had the opportunity to examine the email for potential defects or inconsistencies.<\/span><\/p>\n<h3><b>2. Emails with a Strange Greeting or Salutation<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Emails sent between coworkers typically contain an informal greeting. Those that begin with &#8220;Dear&#8221; or contain phrases not typically used in informal conversation are likely from sources unfamiliar with the way of office interaction used by your company, and you should be suspicious of them.<\/span><\/p>\n<h3><b>3. Suspicious Attachments<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The majority of work-related file sharing now occurs through collaboration platforms like Dropbox, OneDrive, etc. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internal emails with attachments should always be viewed with suspicion, particularly if they have an unfamiliar extension or one commonly associated with malware (.exe, .zip, etc.).<\/span><\/p>\n<h3><b>4. Emails that ask for payment details, login credentials or other sensitive data<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Emails originating from an unexpected or unfamiliar sender that request login credentials, payment information, or other sensitive data should be treated with extreme caution at all times. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Targeted phishers are able to forge login pages that resemble the real thing and send an email containing a link to the fake page. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whenever a recipient is redirected to a login page or informed that a payment is due, they should not enter any information unless they are 100 percent certain that the email is genuine. <\/span><\/p>\n<h3><b>5. Inconsistency in Email Addresses, Domain Names and Links\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Finding inconsistencies in email addresses, URLs, and domain names is another method for identifying phishing. Does the email originate from a frequently-corresponded-with organisation? <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If so, compare the sender&#8217;s address to previous emails sent by the same company. Examine whether a link is valid by hovering the mouse pointer over it and observing what appears.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> If an email claims to be from (for example) Microsoft but the domain name is different, it is a red flag. <\/span><\/p>\n<h3><b>6. Emails that are too good to be true\u00a0<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Emails that are too good to be true are those that encourage the recipient to click on a link or open an attachment by promising a reward of some kind. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the sender is unknown or the recipient did not initiate contact, it is likely that this email is phishing-related.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Examples of these emails are those with email subjects, such as:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You\u2019ve won a lottery!<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Claim Your 1 Mil Prize Money!<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Winning Notification: Claim Your Prize<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Important Invoice Attached<\/span><\/li>\n<\/ul>\n<h2><b>The Notorious Domain Name Renewal Fraud<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you own a website or <a href=\"https:\/\/www.exabytes.sg\/domains\">domain name<\/a>, you should be aware of a new fraud scheme known as the &#8216;Domain Name Renewal Scam.&#8217; Some of the examples of scam activity target on Exabytes:<\/span><\/p>\n<p>Example 1:<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone size-medium wp-image-26762\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email-300x196.png?resize=300%2C196&#038;ssl=1\" alt=\"Exabytes domain name renewal phishing scam email\" width=\"300\" height=\"196\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=300%2C196&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=1024%2C668&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=768%2C501&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=1536%2C1002&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=696%2C454&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=1068%2C697&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=175%2C114&amp;ssl=1 175w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=644%2C420&amp;ssl=1 644w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?resize=741%2C486&amp;ssl=1 741w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?w=1778&amp;ssl=1 1778w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/exabytes-domain-name-renewal-phishing-scam-email.png?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Example 2:<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone size-medium wp-image-26763\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes-300x167.png?resize=300%2C167&#038;ssl=1\" alt=\"phishig email about restore service Exabytes\" width=\"300\" height=\"167\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=300%2C167&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=1024%2C570&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=768%2C428&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=1536%2C855&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=696%2C385&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=1068%2C595&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=205%2C114&amp;ssl=1 205w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?resize=754%2C420&amp;ssl=1 754w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?w=1598&amp;ssl=1 1598w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-email-restore-service-exabytes.png?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Example 3:<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-27163 size-medium\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?resize=139%2C300&#038;ssl=1\" alt=\"latest email phishing blocked by chrome\" width=\"139\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?resize=139%2C300&amp;ssl=1 139w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?resize=474%2C1024&amp;ssl=1 474w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?resize=53%2C114&amp;ssl=1 53w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?resize=194%2C420&amp;ssl=1 194w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/latest-email-phishing-blocked-by-chrome.jpg?w=592&amp;ssl=1 592w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">This scam aims to convince people to transfer domain registration companies or ownership without their consent and\/or to steal sensitive payment information from consumers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This scam is especially convincing because it specifically mentions your domain name and attempts to pressure you into renewing it because it &#8220;will expire soon.&#8221; <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You realise after a moment of consideration that your domain is, in fact, expiring shortly and on the exact date they specified.<\/span><\/p>\n<h2><b>How to Recognize and Avoid Domain Renewal Scams<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Your initial reaction may be to panic and pay the balance immediately, but this can be fraud. Your contact information and domain registration details were likely obtained from a website such as <a href=\"https:\/\/www.exabytes.sg\/blog\/whois-lookup-domain-ownership\/\">WHOIS<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some suggestions for avoiding these fraudulent scams:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure you are aware of your domain registrar&#8217;s name and only renew your domain name through the registrar&#8217;s official website.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avoid being coerced into paying &#8216;immediately&#8217; for anything, particularly over the phone.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Before paying for something that seems unusual, you should always read the fine print and conduct investigation. Professional phishers are now exceedingly adept at infiltrating all types of emails.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trust your intuition. If something doesn&#8217;t feel right, take the time to investigate and confirm its legitimacy.\u00a0<\/span><\/li>\n<\/ul>\n<table>\n<thead>\n<tr>\n<th>Reminder<\/th>\n<th>Details<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>1.<\/td>\n<td>Appointing third party to pass the message<\/td>\n<\/tr>\n<tr>\n<td>Details<\/td>\n<td>Exabytes communicates with clients only through the following domains: exabytes.com, exabytes.my, exabytes.sg, exabytes.co.id, exabytes.cloud. No third party will be appointed to notify clients on behalf of Exabytes.<\/td>\n<\/tr>\n<tr>\n<td>2.<\/td>\n<td>Fake Password Reset Notification<\/td>\n<\/tr>\n<tr>\n<td>Details<\/td>\n<td>Exabytes will not ask clients to log in to their mailbox\/control panel or any login for security measurement\/verification via system notification.<\/td>\n<\/tr>\n<tr>\n<td>3.<\/td>\n<td>Fake Account Activation Verification<\/td>\n<\/tr>\n<tr>\n<td>Details<\/td>\n<td>Exabytes will not suspend hosting accounts without proper reason\/procedure or ask clients to log in to unknown links for identity verification.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><b>Case Studies<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As a <a href=\"https:\/\/www.exabytes.sg\/hosting\">web hosting provider<\/a> and domain registrar with over 20 years of experience, Exabytes has discovered many phishing attempts that targeted our clients. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">One such scam disguised the email content with the Exabytes logo and included Exabytes details in the signature.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read more about these phishing attempts <\/span><a href=\"https:\/\/support.exabytes.com.my\/en\/support\/solutions\/articles\/14000100772-sample-of-checkup-scam\" rel=\"noopener\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">, and learn how to avoid them <\/span><a href=\"https:\/\/support.exabytes.com.my\/en\/support\/discussions\/topics\/14000019841\" rel=\"noopener\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h2><b>Final takeaways<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It&#8217;s important to be extra careful and aware of phishing scams. By learning to spot the signs of a <a href=\"https:\/\/www.exabytes.sg\/blog\/you-got-phished-phishing-emails-and-what-are-they\/\">phishing email<\/a>, like a suspicious sender or a weird-looking link, you can protect yourself from these sneaky scammers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Remember to never give out your personal information, like passwords or credit card numbers, unless you&#8217;re sure it&#8217;s a trustworthy website. And always double check the sender and the link before clicking on anything. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Additionally, keep in mind that phishing scams can also happen over the phone.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last but not least, legitimate companies, including banks, government agencies, and your domain registrar and web hosting provider, will never call you to ask for your passwords.\u00a0<\/span><\/p>\n<p>Related articles:<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/what-is-phishing\/\">Beware of Phishing Scams Everywhere: Click with Caution!<\/a><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/common-cyber-security-threats-should-aware\/\">Most Common Cyber Security Threats You Should Be Aware<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing emails are deceptive attempts to acquire sensitive information, such as passwords and credit card numbers. They appear to be from a reputable company, but they are actually from scammers attempting to deceive you. If you fall victim to a phishing scam, the scammers can use your information to make fraudulent purchases, steal your identity, [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":26758,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293],"tags":[551,540,562,606,603,604,196],"class_list":{"0":"post-26725","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"tag-cyber-security","9":"tag-cybersecurity","10":"tag-data-security","11":"tag-endpoint-security","12":"tag-phishing","13":"tag-phishing-email","14":"tag-security"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2023\/04\/phishing-scam-email-scam-phihsing-domain-renewal.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6X3","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/26725","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=26725"}],"version-history":[{"count":5,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/26725\/revisions"}],"predecessor-version":[{"id":27162,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/26725\/revisions\/27162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/26758"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=26725"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=26725"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=26725"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}