{"id":3923,"date":"2016-11-22T01:17:16","date_gmt":"2016-11-21T22:17:16","guid":{"rendered":"https:\/\/igotoffer.com\/apple\/?p=3923"},"modified":"2023-11-17T06:55:34","modified_gmt":"2023-11-17T06:55:34","slug":"threats-protection","status":"publish","type":"post","link":"https:\/\/igotoffer.com\/apple\/threats-protection","title":{"rendered":"Online Security &#8211; Threats and Protection"},"content":{"rendered":"<p style=\"text-align: justify\">Mac users are just as prone to scams, viruses, and hackers as everyone else, even though some people think that there is a comparative lack of Mac security threats due to Apple\u2019s small market share. Here\u2019s a quick breakdown of what users need to know about Online Security.<!--more--><\/p>\n<div id=\"toc_container\" class=\"no_bullets\"><p class=\"toc_title\">Contents<\/p><ul class=\"toc_list\"><li><a href=\"#8_Most_Common_Cybersecurity_Threats_Types_of_Cyber_Attacks_Cybersecurity_for_Beginners_Video\"><span class=\"toc_number toc_depth_1\">1<\/span> 8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners [Video]<\/a><\/li><li><a href=\"#Online_Security_8211_Threats_and_Protection\"><span class=\"toc_number toc_depth_1\">2<\/span> Online Security &#8211; Threats and Protection<\/a><ul><li><a href=\"#Hackers\"><span class=\"toc_number toc_depth_2\">2.1<\/span> Hackers<\/a><\/li><li><a href=\"#Firewalls\"><span class=\"toc_number toc_depth_2\">2.2<\/span> Firewalls<\/a><\/li><li><a href=\"#Viruses\"><span class=\"toc_number toc_depth_2\">2.3<\/span> Viruses<\/a><\/li><li><a href=\"#Spyware\"><span class=\"toc_number toc_depth_2\">2.4<\/span> Spyware<\/a><\/li><li><a href=\"#Scams\"><span class=\"toc_number toc_depth_2\">2.5<\/span> Scams<\/a><\/li><\/ul><\/li><li><a href=\"#Links\"><span class=\"toc_number toc_depth_1\">3<\/span> Links<\/a><\/li><\/ul><\/div>\n<h2><span id=\"8_Most_Common_Cybersecurity_Threats_Types_of_Cyber_Attacks_Cybersecurity_for_Beginners_Video\">8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners [Video]<\/span><\/h2>\n<div class=\"ytb\">\n<p style=\"text-align: center\"><iframe title=\"8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka\" width=\"1024\" height=\"576\" src=\"https:\/\/www.youtube.com\/embed\/Dk-ZqQ-bfy4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center\">Video uploaded by <a class=\"yt-simple-endpoint style-scope yt-formatted-string\" href=\"https:\/\/www.youtube.com\/@edurekaIN\" target=\"_blank\" rel=\"noopener noreferrer\">edureka!<\/a> on <strong class=\"watch-time-text\">July 18, 2018<\/strong>.<\/p>\n<h2><span id=\"Online_Security_8211_Threats_and_Protection\">Online Security &#8211; Threats and Protection<\/span><\/h2>\n<h3><span id=\"Hackers\">Hackers<\/span><\/h3>\n<p style=\"text-align: justify\">The term hacker is somewhat unclear, as it was originally a term used to describe a legitimate computer programmer. Its popular definition, however, means someone who wants to break into, or meddle with, your computer. Hackers may be professionals out to steal your secrets. They may also be a \u201cscript kiddy,\u201d using a preexisting Trojan. They might be a vandal, spy, thief, or simply just exploring. As far as we are concerned, their status doesn\u2019t matter. Either way, we do not want them or their handiwork inside our computers.<\/p>\n<p style=\"text-align: justify\">You are much less prone to online privacy threats if you regularly install the latest patches and updates. Run\u00a0<em>Apple icon \u2013\u00a0Software Update<\/em>\u00a0every week or so, and always accept any security fixes or OS X upgrades that you are offered.<\/p>\n<h3><span id=\"Firewalls\">Firewalls<\/span><\/h3>\n<p style=\"text-align: justify\">One of the best ways to avoid hackers is to activate a firewall. A firewall can be either a hardware device or software. It prevents people from being able to detect and invade your computer via the internet. Mac OS X comes with a firewall installed, but you may need to turn it on.<\/p>\n<p style=\"text-align: justify\">To turn the firewall on, open <em>System Preferences \u2013 Security<\/em>, click the<em> Firewall<\/em> tab, and select <em>Block all incoming connections<\/em>. For most users, this is all you need to know. However, if any internet-related applications stop working after switching on the <em>Firewall<\/em>, it\u2019s probably not a coincidence. Users can try turning the\u00a0<em>Firewall<\/em>\u00a0off again, to see if that solves the problem. It is possible to choose the\u00a0Limit\u00a0incoming connections\u2026 option and the + button to add specific applications to the allow list. This will open the relevant \u201cports\u201d for the application in question.<\/p>\n<p style=\"text-align: justify\">The built-in firewall in OS X is sufficient Online Security for most home users, but if you are really worried about intrusions, or you want to be able to monitor all the network traffic coming in and out of your machine, grab a third-party application. When you activate any of the sharing options under <em>System Preferences \u2013 Sharing<\/em>, the relevant type of network traffic is automatically added to OS X\u2019s <em>Firewall<\/em> \u201callow\u201d list.<\/p>\n<figure id=\"attachment_11009\" aria-describedby=\"caption-attachment-11009\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"wp-image-11009 size-fix-w-600\" src=\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-firewall-600x400.png\" alt=\"Threats and Protection -- MacOS Firewall\" width=\"600\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-firewall.png 600w, https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-firewall-300x200.png 300w, https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-firewall-272x182.png 272w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-11009\" class=\"wp-caption-text\">Threats and Protection &#8212; MacOS Firewall<\/figcaption><\/figure>\n<h3><span id=\"Viruses\">Viruses<\/span><\/h3>\n<p style=\"text-align: justify\">Mac users, like all other computer users, are also at risk from viruses, worms, Trojans, and other malware. There are always new OS X viruses emerging, and companies with scanning software are aware of that. In reality, the risks are less serious than those for PC users. There are hundreds of viruses in circulation, and the majority of us have suffered from them. If you want the extra protection of virus software, there are a few popular antivirus software to choose from, such as Norton AntiVirus, McAfee Virex, and more.<\/p>\n<p style=\"text-align: justify\">Note that most of the viruses that have affected pre-OS X Macs were macro viruses, spread via Microsoft Word and Excel docs. If you ever receive a doc with embedded macros, choose the Disable Macros option when prompted.<\/p>\n<h3><span id=\"Spyware\">Spyware<\/span><\/h3>\n<p style=\"text-align: justify\">Spyware is a software designed to snoop on your computing activity. Commonly, spyware is planted by some kind of marketer, who wants to find out about your online surfing and spending habits. However, it might be even more sinister: a keystroke-logger that records whatever you type, like when logging into your online bank account.<\/p>\n<p style=\"text-align: justify\">Many computers nowadays are infected with some kind of spyware, mostly the non-dangerous types. Mac users are not safe, so you may want to install the Spyware scanning package, even if you do not believe there is a snitch in your system.<\/p>\n<figure id=\"attachment_11010\" aria-describedby=\"caption-attachment-11010\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" class=\"size-fix-w-600 wp-image-11010\" src=\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-spyware-600x400.jpg\" alt=\"Threats and Protection -- Spyware\" width=\"600\" height=\"400\" srcset=\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-spyware.jpg 600w, https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-spyware-300x200.jpg 300w, https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection-spyware-272x182.jpg 272w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-11010\" class=\"wp-caption-text\">Threats and Protection &#8212; Spyware<\/figcaption><\/figure>\n<h3><span id=\"Scams\">Scams<\/span><\/h3>\n<p style=\"text-align: justify\">Mac users are no less susceptible to online scams than PC users, and the scams are often much more threatening than hackers or viruses.<\/p>\n<p style=\"text-align: justify\"><em>Phishing:<\/em>\u00a0This is a cunning form of online scams, in which someone pretends to be from your bank, ISP, online payment system, or any other such body. They ask you to hand over your personal information, either directly or via a webpage.<\/p>\n<p style=\"text-align: justify\">So, how does it work? Here is one example: A scammer sends out a mass email claiming to be from a bank, with a link directing you to a webpage, purportedly on a real bank\u2019s website. In fact, all the details are slightly incorrect, but the recipient is not supposed to notice the difference, and assume the email is legitimate. The recipient then follows the instructions and \u201cconfirms\u201d the online banking details on the fake site. In the process, people give their personal banking details to criminals who can then empty the account of the victim. The moral: do not ever respond to emails or instant messages requesting your personal data, private banking information, etc., no matter how legitimate they may seem.<\/p>\n<p style=\"text-align: justify\">Never respond to spam! Those \u201cget paid to surf,\u201d \u201cstock tips,\u201d work from home,\u201d \u201crecruit new members,\u201d \u201cclear your credit rating,\u201d or any other network-marketing schemes are always obvious: they look too good to be true. It should go without saying that ringing a number to claim a prize is a stupid idea.<\/p>\n<p style=\"text-align: justify\">Paying by credit card online is usually safe, since credit cards offer some degree of protection against fraud, such as a business going bankrupt before you actually receive the goods. Read the fine print on your agreement for specifics, but normally you are only liable for a set amount. You also might be able to pay a yearly surcharge to fully protect your card against fraud, though this is usually a waste of money unless you think you are more at risk than other clients. If you suspect you have been wrongly charged, ask your bank what to do, but also contact the website in question \u2013 some of them may even pick up the bill if you have been conned.<\/p>\n<p style=\"text-align: justify\">Only enter your card details on secure webpages, which begin with\u00a0https:\/\/. A little lock symbol should also appear in your browser window. If you are concerned about a website\u2019s security, shop elsewhere or order over the phone, but never send your credit card details by email.<\/p>\n<p style=\"text-align: justify\">Do not give extra information, as you need to provide only your name, billing address, delivery address, credit card number, account name, expiry date, and the three-digit security code on the signature strip when you make an online purchase. Never give out your social security number, health insurance details, driver\u2019s license, or passport number.<\/p>\n<h2><span id=\"Links\">Links<\/span><\/h2>\n<ul>\n<li style=\"text-align: justify\">If your eyes are on new faster Macs and you look for good hands to adopt your used one, contact us, and we\u2019ll give you the best price for your gadget: <a href=\"https:\/\/igotoffer.com\/sell\/macbook\" target=\"_blank\" rel=\"noopener\">Sell my Mac online now for top price<\/a>!<\/li>\n<li style=\"text-align: justify\">Read our blog, where you can learn more about all aspects related to the consumer electronics and more: <a href=\"https:\/\/igotoffer.com\/blog\/\" target=\"_blank\" rel=\"noopener\">iGotOffer Blog<\/a>.<\/li>\n<li>Learn more about online security from another trusted source, the famous virtual encyclopedia \u2013 Wikipedia: <a href=\"https:\/\/en.wikipedia.org\/wiki\/Internet_security\" target=\"_blank\" rel=\"noopener\">en.wikipedia.org\/wiki\/Internet_security<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Mac users are just as prone to scams, viruses, and hackers as everyone else, even though some people think that there is a comparative lack of Mac security threats due to Apple\u2019s small market share. Here\u2019s a quick breakdown of what users need to know about Online Security.<\/p>\n","protected":false},"author":2,"featured_media":11005,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[30,80],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Online Security - Threats and Protection | iGotOffer<\/title>\n<meta name=\"description\" content=\"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/igotoffer.com\/apple\/threats-protection\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Security - Threats and Protection | iGotOffer\" \/>\n<meta property=\"og:description\" content=\"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/igotoffer.com\/apple\/threats-protection\" \/>\n<meta property=\"og:site_name\" content=\"About Apple | iGotOffer\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-21T22:17:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-17T06:55:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:site\" content=\"@iGotOffer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GeorgeB\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/igotoffer.com\/apple\/#website\",\"url\":\"https:\/\/igotoffer.com\/apple\/\",\"name\":\"About Apple | iGotOffer\",\"description\":\"Everything about Apple Products\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/igotoffer.com\/apple\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/apple\/threats-protection#primaryimage\",\"url\":\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg\",\"contentUrl\":\"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg\",\"width\":920,\"height\":840,\"caption\":\"Online Security - Threats and Protection\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/igotoffer.com\/apple\/threats-protection#webpage\",\"url\":\"https:\/\/igotoffer.com\/apple\/threats-protection\",\"name\":\"Online Security - Threats and Protection | iGotOffer\",\"isPartOf\":{\"@id\":\"https:\/\/igotoffer.com\/apple\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/igotoffer.com\/apple\/threats-protection#primaryimage\"},\"datePublished\":\"2016-11-21T22:17:16+00:00\",\"dateModified\":\"2023-11-17T06:55:34+00:00\",\"author\":{\"@id\":\"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/38905d68024b33165ddae5714dd8e5e1\"},\"description\":\"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/igotoffer.com\/apple\/threats-protection#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/igotoffer.com\/apple\/threats-protection\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/igotoffer.com\/apple\/threats-protection#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/igotoffer.com\/apple\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Miscellanea\",\"item\":\"https:\/\/igotoffer.com\/apple\/category\/apple-miscellanea\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Online Security &#8211; Threats and Protection\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/38905d68024b33165ddae5714dd8e5e1\",\"name\":\"GeorgeB\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5c24f6e4d33aff5b355578d74b58c1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5c24f6e4d33aff5b355578d74b58c1e?s=96&d=mm&r=g\",\"caption\":\"GeorgeB\"},\"sameAs\":[\"https:\/\/iGotOffer.com\",\"https:\/\/twitter.com\/iGotOffer\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Online Security - Threats and Protection | iGotOffer","description":"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/igotoffer.com\/apple\/threats-protection","og_locale":"en_US","og_type":"article","og_title":"Online Security - Threats and Protection | iGotOffer","og_description":"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.","og_url":"https:\/\/igotoffer.com\/apple\/threats-protection","og_site_name":"About Apple | iGotOffer","article_published_time":"2016-11-21T22:17:16+00:00","article_modified_time":"2023-11-17T06:55:34+00:00","og_image":[{"width":920,"height":840,"url":"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg","type":"image\/jpeg"}],"twitter_card":"summary","twitter_creator":"@iGotOffer","twitter_site":"@iGotOffer","twitter_misc":{"Written by":"GeorgeB","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/igotoffer.com\/apple\/#website","url":"https:\/\/igotoffer.com\/apple\/","name":"About Apple | iGotOffer","description":"Everything about Apple Products","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/igotoffer.com\/apple\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/apple\/threats-protection#primaryimage","url":"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg","contentUrl":"https:\/\/igotoffer.com\/apple\/wp-content\/uploads\/2016\/11\/threats-and-protection.jpg","width":920,"height":840,"caption":"Online Security - Threats and Protection"},{"@type":"WebPage","@id":"https:\/\/igotoffer.com\/apple\/threats-protection#webpage","url":"https:\/\/igotoffer.com\/apple\/threats-protection","name":"Online Security - Threats and Protection | iGotOffer","isPartOf":{"@id":"https:\/\/igotoffer.com\/apple\/#website"},"primaryImageOfPage":{"@id":"https:\/\/igotoffer.com\/apple\/threats-protection#primaryimage"},"datePublished":"2016-11-21T22:17:16+00:00","dateModified":"2023-11-17T06:55:34+00:00","author":{"@id":"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/38905d68024b33165ddae5714dd8e5e1"},"description":"Online Security for Mac users who are just as prone to viruses and hackers as anyone else, even when people think lack of security threats.","breadcrumb":{"@id":"https:\/\/igotoffer.com\/apple\/threats-protection#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/igotoffer.com\/apple\/threats-protection"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/igotoffer.com\/apple\/threats-protection#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/igotoffer.com\/apple\/"},{"@type":"ListItem","position":2,"name":"Apple Miscellanea","item":"https:\/\/igotoffer.com\/apple\/category\/apple-miscellanea"},{"@type":"ListItem","position":3,"name":"Online Security &#8211; Threats and Protection"}]},{"@type":"Person","@id":"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/38905d68024b33165ddae5714dd8e5e1","name":"GeorgeB","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/igotoffer.com\/apple\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d5c24f6e4d33aff5b355578d74b58c1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5c24f6e4d33aff5b355578d74b58c1e?s=96&d=mm&r=g","caption":"GeorgeB"},"sameAs":["https:\/\/iGotOffer.com","https:\/\/twitter.com\/iGotOffer"]}]}},"_links":{"self":[{"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/posts\/3923"}],"collection":[{"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/comments?post=3923"}],"version-history":[{"count":16,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/posts\/3923\/revisions"}],"predecessor-version":[{"id":11007,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/posts\/3923\/revisions\/11007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/media\/11005"}],"wp:attachment":[{"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/media?parent=3923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/categories?post=3923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/igotoffer.com\/apple\/wp-json\/wp\/v2\/tags?post=3923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}