{"id":40029,"date":"2024-10-02T15:39:56","date_gmt":"2024-10-02T15:39:56","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=40029"},"modified":"2024-10-03T14:36:50","modified_gmt":"2024-10-03T14:36:50","slug":"cyber-card-30-vishing-if-you-recognize-it-you-avoid-it","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/","title":{"rendered":"Cyber Card #30 &#8211; Vishing: if you recognize it, you avoid it"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.19.4&#8243; custom_padding=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.19.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px||false|false&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; min_height=&#8221;1363.1px&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h2><span>Knowing the methods of cyber <\/span><span>criminals <\/span><span>to steal sensitive information is the first step in preventing an attack!<\/span><\/h2>\n<p><span>Vishing is a type of social engineering attack similar to smishing.<\/span><\/p>\n<p><span>The difference with other types of phishing is that instead of e-mail or text messages, the attack is carried out with a phone call, which is why it is also called voice phishing. <\/span><\/p>\n<p><span>Typically, vishing uses an automated voice message transmitted by an entity simulating a legitimate institution, such as a bank, government agency, or other company providing legitimate services. <\/span><\/p>\n<p><span>The mechanisms to induce victims to trust and act in the attacker&#8217;s interest are always the same: attackers inform the victim of the presence of money debts, expiring insurance policies, accounts that are about to be blocked, or a credit card on which suspicious activity has been detected and needs to be resolved immediately. <\/span><\/p>\n<p><span>Leveraging on many people&#8217;s fears and concerns, the criminal contacts us precisely to help solve the problem. The victim will even eventually be happy to cooperate, providing all the information he or she asks for, including personal and sensitive information. <\/span><\/p>\n<p><span>Here are <\/span><span>some simple rules to avoid falling into the trap!<\/span><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_EN.webp\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_EN.webp\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><em><strong>This Cyber Card can help you gain the right digital awareness!<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:image -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Knowing the methods of cyber criminals to steal sensitive information is the first step in preventing an attack! Vishing is a type of social engineering attack similar to smishing. The difference with other types of phishing is that instead of e-mail or text messages, the attack is carried out with a phone call, which is [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":40194,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[432],"tags":[473,771,483],"class_list":["post-40029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-card-en","tag-phishing-en-3","tag-smishing-en-2","tag-vishing-3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Card #30 - Vishing: if you recognize it, you avoid it<\/title>\n<meta name=\"description\" content=\"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Card #30 - Vishing: if you recognize it, you avoid it\" \/>\n<meta property=\"og:description\" content=\"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T15:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T14:36:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Card #30 &#8211; Vishing: if you recognize it, you avoid it\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:36:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/\"},\"wordCount\":325,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_EN.webp\",\"keywords\":[\"Phishing\",\"Smishing\",\"Vishing\"],\"articleSection\":[\"Cyber Card\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/\",\"name\":\"Cyber Card #30 - Vishing: if you recognize it, you avoid it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_EN.webp\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:36:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_EN.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_EN.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2024\\\/10\\\/02\\\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Card #30 &#8211; Vishing: if you recognize it, you avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Card #30 - Vishing: if you recognize it, you avoid it","description":"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Card #30 - Vishing: if you recognize it, you avoid it","og_description":"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.","og_url":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-10-02T15:39:56+00:00","article_modified_time":"2024-10-03T14:36:50+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Card #30 &#8211; Vishing: if you recognize it, you avoid it","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:36:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/"},"wordCount":325,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp","keywords":["Phishing","Smishing","Vishing"],"articleSection":["Cyber Card"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/","url":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/","name":"Cyber Card #30 - Vishing: if you recognize it, you avoid it","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:36:50+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Learn how to recognize and avoid Vishing, an attack method used by cyber criminals to steal your sensitive information.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_EN.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2024\/10\/02\/cyber-card-30-vishing-if-you-recognize-it-you-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Card #30 &#8211; Vishing: if you recognize it, you avoid it"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/40029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=40029"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/40029\/revisions"}],"predecessor-version":[{"id":40201,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/40029\/revisions\/40201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/40194"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=40029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=40029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=40029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}