{"id":826,"date":"2023-12-01T15:00:00","date_gmt":"2023-12-01T07:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=826"},"modified":"2023-10-11T15:40:20","modified_gmt":"2023-10-11T07:40:20","slug":"dangerous-attachments-to-beware-of-in-emails","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/","title":{"rendered":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> &gt; <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> &gt; Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-bm2th3z \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-bm2th3z button-1\" data-id=\"eb-advance-heading-bm2th3z\"><h1 class=\"eb-ah-title\">Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails<\/h1><p class=\"eb-ah-subtitle\">December 01, 2023<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-1024x538.jpg\" alt=\"\" class=\"wp-image-828\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Email has become an integral part of our daily communication, both for personal and professional purposes. However, it&#8217;s important to be cautious about the various types of attachments that can pose significant risks to your online security. In this article, we will highlight some of the most dangerous attachments to beware of in emails, equipping you with knowledge to help you identify and avoid potential threats.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Executable Files (.exe, .bat, .msi)<\/strong><\/h4>\n\n\n\n<p>Attachments with executable file extensions, such as .exe, .bat, or .msi, are highly risky. These files can contain malware, viruses, or other malicious scripts that can harm your computer or compromise your data. Exercise extreme caution when receiving such attachments, especially from unfamiliar or suspicious sources, and avoid opening them unless you are absolutely certain about their legitimacy.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Macro-Enabled Office Documents<\/strong><\/h4>\n\n\n\n<p>Microsoft Office documents, such as Word or Excel files, that contain macro-enabled content can be potential vehicles for malware. Macros are scripts that automate tasks, but they can also be exploited by cybercriminals to execute malicious code. Be cautious when opening Office documents with macros, and enable the application&#8217;s security settings to prompt before executing any embedded scripts.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>ZIP or RAR Archives<\/strong><\/h4>\n\n\n\n<p>Compressed archive files, such as ZIP or RAR, are commonly used to package multiple files into a single attachment. However, cybercriminals often utilize these formats to hide malware or other dangerous content. Exercise caution when opening archive files from unknown or unexpected sources. Scan the contents with an up-to-date antivirus program before extracting or executing any files within the archive.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>PDF Attachments<\/strong><\/h4>\n\n\n\n<p>As mentioned in a <a href=\"https:\/\/lookafter.com\/blog\/email-safety-tips-can-pdf-attachments-be-dangerous\" target=\"_blank\" rel=\"noreferrer noopener\">previous article<\/a>, PDF attachments can also be dangerous if not handled properly. They can contain malicious scripts, exploit vulnerabilities in PDF reader software, or serve as a disguise for phishing attacks. Always be cautious when opening PDF attachments, especially from untrusted sources or those that request sensitive information.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Links and URL Attachments<\/strong><\/h4>\n\n\n\n<p>Emails may include clickable links or attachments that redirect you to malicious websites or initiate downloads of harmful files. These links may be masked as legitimate URLs but can lead you to phishing sites, malware-infected pages, or sites that attempt to exploit software vulnerabilities. Always hover over links to verify their destination before clicking, and avoid downloading attachments from suspicious or unsolicited emails.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Image Files<\/strong><\/h4>\n\n\n\n<p>Image files, such as JPEG or PNG, are generally considered safe. However, cybercriminals can hide malicious code within image files to exploit vulnerabilities in image processing software or launch attacks when the image is opened. While the risk is relatively low compared to other attachment types, exercise caution when opening image files from unknown sources or if they are unexpectedly large or out of context.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In conclusion, attachments in emails can pose significant risks to your online security if you&#8217;re not vigilant. By being aware of the dangerous attachment types mentioned above and exercising caution when handling them, you can minimize the chances of falling victim to malware, phishing attacks, or other cyber threats. Remember to always verify the sender, use reliable antivirus software, keep your applications up to date, and adopt safe browsing practices to protect yourself from the dangers lurking within email attachments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.<\/p>\n","protected":false},"author":1,"featured_media":828,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails<\/title>\n<meta name=\"description\" content=\"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails\" \/>\n<meta property=\"og:description\" content=\"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-01T07:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails\",\"datePublished\":\"2023-12-01T07:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\"},\"wordCount\":564,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\",\"url\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\",\"name\":\"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg\",\"datePublished\":\"2023-12-01T07:00:00+00:00\",\"description\":\"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Dangerous Attachments to Beware of in Emails\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails","description":"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/","og_locale":"en_US","og_type":"article","og_title":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails","og_description":"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.","og_url":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2023-12-01T07:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails","datePublished":"2023-12-01T07:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/"},"wordCount":564,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/","url":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/","name":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg","datePublished":"2023-12-01T07:00:00+00:00","description":"Identify the types of dangerous attachments that you may encounter on your everyday email, which can pose risk to your online security.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/09\/40.jpg","width":1200,"height":630,"caption":"Dangerous Attachments to Beware of in Emails"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/dangerous-attachments-to-beware-of-in-emails\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Know Your Inbox Enemies: Dangerous Attachments to Beware of in Emails"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=826"}],"version-history":[{"count":4,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/826\/revisions"}],"predecessor-version":[{"id":1004,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/826\/revisions\/1004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/828"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}