{"id":26356,"date":"2019-09-10T15:11:11","date_gmt":"2019-09-10T15:11:11","guid":{"rendered":"http:\/\/35.157.126.229\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/"},"modified":"2024-05-02T15:57:51","modified_gmt":"2024-05-02T15:57:51","slug":"cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/","title":{"rendered":"Cyber Card #04 &#8211; How to avoid malware and their &#8220;malicious intentions&#8221;"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]Cyber Card #4 points out some simple steps to follow in order not to fall victim to Cyber Crime, in particular <strong>to prevent malware from installing itself in our computers, in its many forms<\/strong>.<\/p>\n<p>Why is it so important? This is because the trigger of a cyberattack strategy very often occurs through the use of malware. Malware can steal sensitive data from your computer, slow it down progressively, or use your email accounts, without your knowledge, to send infected emails.<\/p>\n<p>To install themselves on our computers, however, they need the <strong>&#8220;unwitting&#8221; cooperation of the victim<\/strong>.<\/p>\n<p>Some measures can therefore help us to prevent difficult situations:<\/p>\n<ol>\n<li><strong>Do not open any attachments or links in emails<\/strong> with an \u00a0unknown sender\u00a0or with a suspicious subject line or text<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>Do not &#8220;blindly&#8221; click on\u00a0advertisements<\/strong>, banners and pop-ups on the Internet that promise special discounts<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>Do not enter sensitive data<\/strong>\u00a0such as login data, bank account,\u00a0or passwords, if you are not sure of the authenticity of the request<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\">Download <strong>apps and files only from\u00a0reliable sources<\/strong> and avoid downloading\u00a0unwanted apps or programmes.<\/p>\n<\/li>\n<\/ol>\n<p>Keep following our Cards to learn some simple tips to defend yourself against Cyber Crime!<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/4EN-724x1024.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/4EN-724x1024.png\" alt=\"4 (2)\" class=\"wp-image-18994\" width=\"816\" height=\"1154\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Card #4 points out some simple steps to follow in order not to fall victim to Cyber Crime, in particular to prevent malware from installing itself in our computers, in its many forms. Why is it so important? This is because the trigger of a cyberattack strategy very often occurs through the use of [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[487,833,470,473,836],"class_list":["post-26356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en","tag-cyber-awareness-en-2","tag-cyber-card-en-2","tag-cyber-security-awareness-en-3","tag-phishing-en-3","tag-scams-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #04 - How to avoid malware and their &quot;malicious intentions&quot; -<\/title>\n<meta name=\"description\" content=\"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #04 - How to avoid malware and their &quot;malicious intentions&quot;\" \/>\n<meta property=\"og:description\" content=\"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T15:11:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T15:57:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #04 &#8211; How to avoid malware and their &#8220;malicious intentions&#8221;\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2024-05-02T15:57:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/\"},\"wordCount\":319,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04EN.png\",\"keywords\":[\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"Phishing\",\"Scams\"],\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/\",\"name\":\"Cyber Card #04 - How to avoid malware and their \\\"malicious intentions\\\" -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04EN.png\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2024-05-02T15:57:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04EN.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04EN.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2019\\\/09\\\/10\\\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #04 &#8211; How to avoid malware and their &#8220;malicious intentions&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #04 - How to avoid malware and their \"malicious intentions\" -","description":"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #04 - How to avoid malware and their \"malicious intentions\"","og_description":"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?","og_url":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2019-09-10T15:11:11+00:00","article_modified_time":"2024-05-02T15:57:51+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #04 &#8211; How to avoid malware and their &#8220;malicious intentions&#8221;","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2024-05-02T15:57:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/"},"wordCount":319,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png","keywords":["Cyber Awareness","cyber card","Cyber Security Awareness","Phishing","Scams"],"articleSection":["Cyber Card"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/","url":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/","name":"Cyber Card #04 - How to avoid malware and their \"malicious intentions\" -","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2024-05-02T15:57:51+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"This Cyber Card is dedicated to malware, which is often deployed as a trigger for cyberattacks. What can be done to avoid them?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04EN.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2019\/09\/10\/cyber-card-04-how-to-avoid-malware-and-their-malicious-intentions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #04 &#8211; How to avoid malware and their &#8220;malicious intentions&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=26356"}],"version-history":[{"count":9,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26356\/revisions"}],"predecessor-version":[{"id":28563,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26356\/revisions\/28563"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/25091"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=26356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=26356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=26356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}