{"id":5807,"date":"2020-10-16T14:41:06","date_gmt":"2020-10-16T18:41:06","guid":{"rendered":"https:\/\/technology.wooster.edu\/?p=5807"},"modified":"2022-08-04T08:50:30","modified_gmt":"2022-08-04T12:50:30","slug":"what-is-malware","status":"publish","type":"post","link":"https:\/\/inside.wooster.edu\/technology\/what-is-malware\/","title":{"rendered":"What is Malware?"},"content":{"rendered":"<p><a href=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5878\" src=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1.jpg\" alt=\"\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1.jpg 2560w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-300x200.jpg 300w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1024x683.jpg 1024w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-768x512.jpg 768w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1536x1024.jpg 1536w, https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-2048x1366.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/a><\/p>\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@markusspiske?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Markus Spiske<\/a> on <a href=\"https:\/\/unsplash.com\/s\/photos\/malware?utm_source=unsplash&amp;utm_medium=referral&amp;utm_content=creditCopyText\">Unsplash<\/a><\/p>\n<h2>What is Malware?<\/h2>\n<p><span data-contrast=\"auto\">Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Not all malware is destructive, though it can cause annoying\u00a0<\/span><span data-contrast=\"auto\">behaviors<\/span><span data-contrast=\"auto\">\u00a0such as\u00a0<\/span><span data-contrast=\"auto\">generating an abundance of pop-up ads or\u00a0<\/span><span data-contrast=\"auto\">cause<\/span><span data-contrast=\"auto\">\u00a0your computer to run slowly. In addition to this<\/span><span data-contrast=\"auto\">, it can also steal data.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">What are some types of Malware?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<h3><span data-contrast=\"none\">Viruses<\/span><\/h3>\n<p><span data-contrast=\"auto\">Viruses <\/span><span data-contrast=\"auto\">infect<\/span><span data-contrast=\"auto\">\u00a0program files and\/or personal files<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0They are a malicious code or program written to change the way a computer<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">works<\/span><span data-contrast=\"auto\">\u00a0and is designed to spread from one computer to another.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Adware<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Adware is\u00a0<\/span><span data-contrast=\"auto\">software that shows unwanted advertising on a computer or mobile devic<\/span><span data-contrast=\"auto\">e<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">in<\/span><span data-contrast=\"auto\">\u00a0the form of pop-up ads or redirecting your browser to a specific website.<\/span><span data-contrast=\"auto\">\u00a0Adware does not cause any direct harm to a user\u2019s\u00a0<\/span><span data-contrast=\"auto\">device:<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">h<\/span><span data-contrast=\"auto\">owever,<\/span><span data-contrast=\"auto\">\u00a0it can produce bothersome behaviors and can sometimes\u00a0<\/span><span data-contrast=\"auto\">have<\/span><span data-contrast=\"auto\">\u00a0spyware.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Spyware<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Spyware hides on your computer and monitors everything that you do. It can track web\u00a0<\/span><span data-contrast=\"auto\">activity<\/span><span data-contrast=\"auto\">, access emails, and steal\u00a0<\/span><span data-contrast=\"auto\">username<\/span><span data-contrast=\"auto\">\u00a0and password information.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Browser Hijacker<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Browser hijacking\u00a0<\/span><span data-contrast=\"auto\">is<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">when malicious software redirects your computer\u2019s browser to a designated website.<\/span><span data-contrast=\"auto\">\u00a0It is typically used to display advertising, but it can also be<\/span><span data-contrast=\"auto\">\u00a0use<\/span><span data-contrast=\"auto\">d\u00a0<\/span><span data-contrast=\"auto\">to generate visits to a<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">particular<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">website or<\/span><span data-contrast=\"auto\">\u00a0lead you to a\u00a0<\/span><span data-contrast=\"auto\">malicious website that downloads malware onto your computer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Bots<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Bots are an application that carries out the automated <\/span><span data-contrast=\"auto\">task<\/span><span data-contrast=\"auto\">\u00a0on a user\u2019s computer. An example w<\/span><span data-contrast=\"auto\">o<\/span><span data-contrast=\"auto\">uld be an <\/span><span data-contrast=\"auto\">attack<\/span><span data-contrast=\"auto\">\u00a0on other machi<\/span><span data-contrast=\"auto\">ne<\/span><span data-contrast=\"auto\">s to create a botnet.\u00a0<\/span><span data-contrast=\"auto\">When a bot infects a computer, the computer is referred to as a \u201czombie<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u201d<\/span><span data-contrast=\"auto\">\u00a0because it is<\/span><span data-contrast=\"auto\">\u00a0now<\/span><span data-contrast=\"auto\"> under the control of the hacker.<\/span><span data-contrast=\"auto\"> Some of the uses of botnets are for distributing spam, injecting adware onto other computers, recruiting other computers for Denial of Service (DoS) attacks, and more.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Trojan\u00a0<\/span><span data-contrast=\"none\">Horses<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Trojan Horses can cause severe harm to data such as deletion, <\/span><span data-contrast=\"auto\">modification<\/span><span data-contrast=\"auto\">, copying, stealing, and disruption of network activity. The malware is named Trojan Horse\u00a0<\/span><span data-contrast=\"auto\">because it hides m<\/span><span data-contrast=\"auto\">alware in<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">a<\/span><span data-contrast=\"auto\">\u00a0normal file<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">This<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">is a reference to the\u00a0<\/span><span data-contrast=\"auto\">Greek tale<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">of the<\/span><span data-contrast=\"auto\">\u00a0use of a<\/span><span data-contrast=\"auto\">\u00a0wooden horse used to fool the defenders of Troy into allowing the hidden soldiers into their city<\/span><span data-contrast=\"auto\">\u00a0during the Trojan Wars<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"none\">Ransomware<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Ransomware is a\u00a0<\/span><span data-contrast=\"auto\">high-level<\/span><span data-contrast=\"auto\"> threat, as it holds the data on your computer hostage via file encryption, which often demands a fee to regain access to the data.<\/span><span data-contrast=\"auto\"> Never pay the fee requested by the attacker to unlock your data. Instead, do regular backups<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">and if infected, restore your computer from your most recent backup.<\/span><span data-contrast=\"auto\">\u00a0In the event that\u00a0this occurs\u00a0<\/span><span data-contrast=\"auto\">to your computer<\/span><span data-contrast=\"auto\">, please reach out to the Help Desk.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><span data-contrast=\"none\">Worms<\/span><\/h3>\n<p><span data-contrast=\"auto\">A computer worm spreads as many copies of itself from computer to\u00a0<\/span><span data-contrast=\"auto\">computer<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">A\u00a0<\/span><span data-contrast=\"auto\">worm<\/span><span data-contrast=\"auto\">\u00a0can replicate itself without any human interference and does not need\u00a0<\/span><span data-contrast=\"auto\">to<\/span><span data-contrast=\"auto\">\u00a0attach itself to a program to cause damage. Worms can\u00a0<\/span><span data-contrast=\"auto\">change<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">delete<\/span><span data-contrast=\"auto\">\u00a0files, and inject\u00a0<\/span><span data-contrast=\"auto\">more<\/span><span data-contrast=\"auto\">\u00a0malware onto the computer.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"none\">How can you protect yoursel<\/span><span data-contrast=\"none\">f<\/span><span data-contrast=\"none\">\u00a0from Malware?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:40,&quot;335559739&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The best way to avoid malware is to\u00a0<\/span><span data-contrast=\"auto\">keep your devices healthy and up to date<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-contrast=\"auto\">Critically, you can help<\/span><span data-contrast=\"auto\">\u00a0to prevent malware from reaching your computer<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">by installing an antivirus\/anti<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">malware program<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">You\u00a0<\/span><span data-contrast=\"auto\">make<\/span><span data-contrast=\"auto\">\u00a0sure to<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">configure\u00a0<\/span><span data-contrast=\"auto\">it to constantly\u00a0<\/span><span data-contrast=\"auto\">scan for<\/span><span data-contrast=\"auto\">\u00a0signs of malicious activity in downloads and active files.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Some recommended antivirus<\/span><span data-contrast=\"auto\">\/anti-malware programs included Sophos, Bitdefender, and Malware Bytes. If you have questions about antivirus\/anti<\/span><span data-contrast=\"auto\">-malware programs, please reach out to the Help Desk.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><span data-contrast=\"auto\">Sources:<\/span><\/h2>\n<p><span data-contrast=\"auto\">https:\/\/us.norton.com\/internetsecurity-malware-what-is-a-computer-virus.html<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">https:\/\/community.norton.com\/en\/blogs\/norton-protection-blog\/malware-101-what-malware<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">https:\/\/www.lifewire.com\/what-is-malware-2625933<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.\u00a0 Not all malware is destructive, though it can cause annoying\u00a0behaviors\u00a0such as\u00a0generating an abundance of pop-up ads or\u00a0cause\u00a0your computer to run slowly. In [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":5878,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[12,47],"tags":[],"coauthors":[412],"class_list":["post-5807","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sta-article"],"acf":[],"gutentor_comment":0,"featured_image_urls":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1.jpg",2560,1707,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-300x200.jpg",300,200,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-768x512.jpg",768,512,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-2048x1366.jpg",2048,1366,true]},"post_excerpt_stackable":"<p>Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.\u00a0 Not all malware is destructive, though it can cause annoying\u00a0behaviors\u00a0such as\u00a0generating an abundance of pop-up ads or\u00a0cause\u00a0your computer to run slowly. In addition to this, it can also steal data.\u00a0 What are some types of Malware?\u00a0 Viruses Viruses infect\u00a0program files and\/or personal files.\u00a0They are a malicious code or program written to change the way a computer\u00a0works\u00a0and is designed to spread from one computer to another.\u00a0 Adware\u00a0 Adware&hellip;<\/p>\n","category_list":"<a href=\"https:\/\/inside.wooster.edu\/technology\/category\/cybersecurity\/\" rel=\"category tag\">Cybersecurity<\/a>, <a href=\"https:\/\/inside.wooster.edu\/technology\/category\/sta-article\/\" rel=\"category tag\">STA Article<\/a>","author_info":{"name":"Aubry Miller","url":"https:\/\/inside.wooster.edu\/technology\/author\/amiller22wooster-edu\/"},"comments_num":"0 comments","uagb_featured_image_src":{"full":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1.jpg",2560,1707,false],"thumbnail":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-150x150.jpg",150,150,true],"medium":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-300x200.jpg",300,200,true],"medium_large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-768x512.jpg",768,512,true],"large":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1024x683.jpg",1024,683,true],"1536x1536":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-1536x1024.jpg",1536,1024,true],"2048x2048":["https:\/\/inside.wooster.edu\/technology\/wp-content\/uploads\/sites\/83\/2020\/10\/markus-spiske-iar-afB0QQw-unsplash-scaled-1-2048x1366.jpg",2048,1366,true]},"uagb_author_info":{"display_name":"Aubry Miller","author_link":"https:\/\/inside.wooster.edu\/technology\/author\/amiller22wooster-edu\/"},"uagb_comment_info":0,"uagb_excerpt":"Photo by Markus Spiske on Unsplash What is Malware? Malware, which is a combination of the words malicious and software, is an umbrella term for any kind of software designed with malicious intent.\u00a0 Not all malware is destructive, though it can cause annoying\u00a0behaviors\u00a0such as\u00a0generating an abundance of pop-up ads or\u00a0cause\u00a0your computer to run slowly. In&hellip;","_links":{"self":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5807","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/comments?post=5807"}],"version-history":[{"count":1,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5807\/revisions"}],"predecessor-version":[{"id":23636,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/posts\/5807\/revisions\/23636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media\/5878"}],"wp:attachment":[{"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/media?parent=5807"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/categories?post=5807"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/tags?post=5807"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/inside.wooster.edu\/technology\/wp-json\/wp\/v2\/coauthors?post=5807"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}