{"id":26443,"date":"2021-04-22T13:26:23","date_gmt":"2021-04-22T13:26:23","guid":{"rendered":"http:\/\/35.157.126.229\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/"},"modified":"2024-05-02T15:56:08","modified_gmt":"2024-05-02T15:56:08","slug":"cyber-card-16-trojans-why-a-click-can-be-dangerous","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/","title":{"rendered":"Cyber Card #16 &#8211; Trojans: why a click can be dangerous"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;30px|30px|30px|30px|true|true&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div id=\"pl-7437\" class=\"panel-layout\">\n<div id=\"pg-7437-0\" class=\"panel-grid panel-has-style\" data-style=\"{\" padding=\"\">\n<div style=\"padding: 10px 0;\" data-overlay=\"true\" data-overlay-color=\"#000000\" class=\"panel-row-style panel-row-style-for-7437-0\">\n<div id=\"pgc-7437-0-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-7437-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" data-style=\"{\" background_image_attachment=\"\">\n<div style=\"text-align: left;\" data-title-color=\"#443f3f\" data-headings-color=\"#443f3f\" class=\"panel-widget-style panel-widget-style-for-7437-0-0-0\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p>A cyberattack can affect anyone. Sometimes all it takes is a simple click <span class=\"JsGRdQ\">to open the door for a virus such as Trojan Horse, which can be silent for long periods before activating and propagating itself within the networks to which you are connected. Once installed, the Trojan allows hackers to perform many different actions, including: spying on your online activity, accessing and copying your files, modifying and deleting your data, compromising your computer&#8217;s performance and even stealing your personal information<\/span>.<\/p>\n<p>The first rule to follow is always to be very cautious when clicking on suspicious or dubious links and attachments, and to always be wary of the word &#8220;free&#8221;&#8230; the cost could be very high.<\/p>\n<p><span class=\"JsGRdQ\">So what should we do? Cyber Card #16 provides simple suggestions <\/span><span class=\"JsGRdQ\">to follow&#8230;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\">not to become &#8220;unwitting&#8221; victims of cyber crime.<\/p>\n<p style=\"text-align: center;\"><em><strong>Keep following our Cards!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/16EN-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/16EN-1-724x1024.png\" alt=\"\" class=\"wp-image-25207\" width=\"820\" height=\"1160\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyberattack can affect anyone. Sometimes all it takes is a simple click to open the door for a virus such as Trojan Horse, which can be silent for long periods before activating and propagating itself within the networks to which you are connected. Once installed, the Trojan allows hackers to perform many different actions, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[487,833,470,473,617],"class_list":["post-26443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en","tag-cyber-awareness-en-2","tag-cyber-card-en-2","tag-cyber-security-awareness-en-3","tag-phishing-en-3","tag-trojan-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #16 - Trojans: why a click can be dangerous<\/title>\n<meta name=\"description\" content=\"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #16 - Trojans: why a click can be dangerous\" \/>\n<meta property=\"og:description\" content=\"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-22T13:26:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-02T15:56:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #16 &#8211; Trojans: why a click can be dangerous\",\"datePublished\":\"2021-04-22T13:26:23+00:00\",\"dateModified\":\"2024-05-02T15:56:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/\"},\"wordCount\":264,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/16EN.png\",\"keywords\":[\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"Phishing\",\"trojan\"],\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/\",\"name\":\"Cyber Card #16 - Trojans: why a click can be dangerous\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/16EN.png\",\"datePublished\":\"2021-04-22T13:26:23+00:00\",\"dateModified\":\"2024-05-02T15:56:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/16EN.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/16EN.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2021\\\/04\\\/22\\\/cyber-card-16-trojans-why-a-click-can-be-dangerous\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #16 &#8211; Trojans: why a click can be dangerous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #16 - Trojans: why a click can be dangerous","description":"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #16 - Trojans: why a click can be dangerous","og_description":"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...","og_url":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2021-04-22T13:26:23+00:00","article_modified_time":"2024-05-02T15:56:08+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #16 &#8211; Trojans: why a click can be dangerous","datePublished":"2021-04-22T13:26:23+00:00","dateModified":"2024-05-02T15:56:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/"},"wordCount":264,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png","keywords":["Cyber Awareness","cyber card","Cyber Security Awareness","Phishing","trojan"],"articleSection":["Cyber Card"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/","url":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/","name":"Cyber Card #16 - Trojans: why a click can be dangerous","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png","datePublished":"2021-04-22T13:26:23+00:00","dateModified":"2024-05-02T15:56:08+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"What is a Trojan, and what should you do to avoid becoming a victim of one? Card #16 has some practical tips to follow...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/16EN.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2021\/04\/22\/cyber-card-16-trojans-why-a-click-can-be-dangerous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #16 &#8211; Trojans: why a click can be dangerous"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=26443"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26443\/revisions"}],"predecessor-version":[{"id":28507,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/26443\/revisions\/28507"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/25041"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=26443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=26443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=26443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}