{"id":22389,"date":"2020-06-22T13:11:12","date_gmt":"2020-06-22T18:11:12","guid":{"rendered":"https:\/\/blogs.funiber.org\/pt\/?p=22389"},"modified":"2020-06-22T13:11:12","modified_gmt":"2020-06-22T18:11:12","slug":"funiber-descobrir-hack","status":"publish","type":"post","link":"https:\/\/www.funiber.blog\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack","title":{"rendered":"Como descobrir um\u00a0hack"},"content":{"rendered":"<h2>Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.<\/h2>\n<p>O uso da Internet aumentou consideravelmente nos \u00faltimos meses, devido ao confinamento dos cidad\u00e3os.\u00a0Ao mesmo tempo, tamb\u00e9m houve um aumento de ataques cibern\u00e9ticos.<!--more--><\/p>\n<p>Os criminosos se aproveitaram da\u00a0situa\u00e7\u00e3o atual com um grande n\u00famero de pessoas que trabalham a partir de casa ou consumir lazer.\u00a0Pesquisas relacionadas ao coronav\u00edrus tamb\u00e9m foram uma isca para os\u00a0criminosos cibern\u00e9ticos.\u00a0H\u00e1 uma s\u00e9rie de pistas que podem responder \u00e0 quest\u00e3o de saber se fomos\u00a0v\u00edtimas de um ataque.<\/p>\n<p>\u201cOs usu\u00e1rios foram capazes de sofrer diferentes tipos de ataques: cada um deles fornece algumas pistas para identificar a invas\u00e3o de criminosos cibern\u00e9ticos.\u00a0Os mais utilizados foram o\u00a0<em>phishing\u00a0<\/em>(quando criminosos se apresentam como organiza\u00e7\u00f5es oficiais ou falsificam p\u00e1ginas da web para obter dados do usu\u00e1rio) e a cria\u00e7\u00e3o de dom\u00ednios falsos ou maliciosos\u201d, diz o\u00a0jorna<a href=\"https:\/\/translate.google.com\/translate?hl=pt-BR&amp;prev=_t&amp;sl=es&amp;tl=pt&amp;u=https:\/\/elpais.com\">l<\/a>\u00a0espanhol\u00a0<a href=\"https:\/\/elpais.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">El Pa\u00eds<\/a>\u00a0.\u00a0<em>\u00a0<\/em><\/p>\n<p>O\u00a0<a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener noreferrer\">Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE)<\/a>\u00a0recomenda visitar o\u00a0<a href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">site <u>Have I Been Pwned?<\/u>\u00a0<\/a>Para\u00a0verificar poss\u00edveis hacks.\u00a0Este site \u00e9\u00a0um &#8221;\u00a0mecanismo de pesquisa que compara o e-mail digitado com um banco de dados de contas cujos dados foram filtrados ou expostos&#8221;, diz o jornal acima mencionado.<\/p>\n<p>Os\u00a0servi\u00e7os de streaming tamb\u00e9m s\u00e3o suscet\u00edveis a esses problemas.\u00a0\u201cAtualmente, existe um mercado altamente desenvolvido e ativo para credenciais de\u00a0<em>streaming\u00a0<\/em>roubadas, que s\u00e3o vendidas a pre\u00e7os reduzidos.\u00a0Elas s\u00e3o oferecidos por meio de sofisticadas lojas on-line, com op\u00e7\u00f5es flex\u00edveis de pre\u00e7os, al\u00e9m de garantia e at\u00e9 informa\u00e7\u00f5es de contato em caso de problemas\u201d, afirmam especialistas da empresa de seguran\u00e7a cibern\u00e9tica Proofpoint.\u00a0<em>\u00a0<\/em><\/p>\n<p><a href=\"https:\/\/www.funiber.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">A FUNIBER<\/a>\u00a0patrocina in\u00fameros programas universit\u00e1rios destinados a oferecer aos profissionais informa\u00e7\u00f5es completas e atualizadas sobre seguran\u00e7a cibern\u00e9tica, t\u00e3o importantes hoje em dia.\u00a0Um dos cursos oferecidos \u00e9\u00a0o\u00a0<a href=\"https:\/\/translate.google.com\/translate?hl=pt-BR&amp;prev=_t&amp;sl=es&amp;tl=pt&amp;u=https:\/\/www.funiber.org\/maestria-en-transformacion-digital\">Mestrado em Transforma\u00e7\u00e3o Digital<\/a>.<\/p>\n<p>Fonte:\u00a0<a href=\"https:\/\/elpais.com\/tecnologia\/2020-05-27\/como-saber-si-te-han-hackeado-durante-el-confinamiento.html\" target=\"_blank\" rel=\"noopener noreferrer\">C\u00f3mo saber si te han \u2018hackeado\u2019 durante el confinamiento<\/a><\/p>\n<p>Foto: Todos os direitos reservados.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias. O uso da Internet aumentou consideravelmente nos \u00faltimos meses, devido ao confinamento dos cidad\u00e3os.\u00a0Ao mesmo tempo, tamb\u00e9m houve um aumento de ataques cibern\u00e9ticos.<\/p>\n","protected":false},"author":10,"featured_media":22390,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[6],"tags":[1242,6280,855,285,408,119,248,911,6278,86,671,641,255,787,1710,6279,26,51,1958],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Como descobrir um\u00a0hack<\/title>\n<meta name=\"description\" content=\"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Como descobrir um\u00a0hack\" \/>\n<meta property=\"og:description\" content=\"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\" \/>\n<meta property=\"og:site_name\" content=\"FuniBlogs - FUNIBER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/funiber\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-22T18:11:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/06\/funiber-hack-seguranca.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"570\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:site\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\"},\"author\":{\"name\":\"Michelle\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\"},\"headline\":\"Como descobrir um\u00a0hack\",\"datePublished\":\"2020-06-22T18:11:12+00:00\",\"dateModified\":\"2020-06-22T18:11:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\"},\"wordCount\":369,\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"keywords\":[\"Bolsas\",\"dom\u00ednios falsos\",\"Doutorado\",\"Educa\u00e7\u00e3o\",\"Educa\u00e7\u00e3o a Dist\u00e2ncia\",\"Estudos\",\"Funiber\",\"FUNIBER Opini\u00f5es\",\"hack\",\"Internet\",\"mestrado\",\"Opini\u00e3o FUNIBER\",\"Opini\u00f5es Funiber\",\"Seguran\u00e7a cibern\u00e9tica\",\"Seguran\u00e7a de dados\",\"seguran\u00e7a digital\",\"tecnologia\",\"TI\",\"Transforma\u00e7\u00e3o Digital\"],\"articleSection\":[\"Tecnologias TIC\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\",\"name\":\"Como descobrir um\u00a0hack\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\"},\"datePublished\":\"2020-06-22T18:11:12+00:00\",\"dateModified\":\"2020-06-22T18:11:12+00:00\",\"description\":\"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/blogs.funiber.org\/pt\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Como descobrir um\u00a0hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"name\":\"FuniBlogs - FUNIBER\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\",\"name\":\"FuniBlogs - FUNIBER\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"contentUrl\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"width\":1,\"height\":1,\"caption\":\"FuniBlogs - FUNIBER\"},\"image\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/funiber\",\"https:\/\/twitter.com\/FUNIBER\",\"https:\/\/www.instagram.com\/funiber_becas\",\"https:\/\/www.youtube.com\/user\/funiber\",\"https:\/\/www.linkedin.com\/company\/funiber\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\",\"name\":\"Michelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"caption\":\"Michelle\"},\"url\":\"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Como descobrir um\u00a0hack","description":"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack","og_locale":"pt_BR","og_type":"article","og_title":"Como descobrir um\u00a0hack","og_description":"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.","og_url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack","og_site_name":"FuniBlogs - FUNIBER","article_publisher":"https:\/\/www.facebook.com\/funiber","article_published_time":"2020-06-22T18:11:12+00:00","og_image":[{"width":570,"height":350,"url":"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/06\/funiber-hack-seguranca.jpg","type":"image\/jpeg"}],"author":"Michelle","twitter_card":"summary_large_image","twitter_creator":"@FUNIBER","twitter_site":"@FUNIBER","twitter_misc":{"Escrito por":"Michelle","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#article","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack"},"author":{"name":"Michelle","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d"},"headline":"Como descobrir um\u00a0hack","datePublished":"2020-06-22T18:11:12+00:00","dateModified":"2020-06-22T18:11:12+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack"},"wordCount":369,"publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"keywords":["Bolsas","dom\u00ednios falsos","Doutorado","Educa\u00e7\u00e3o","Educa\u00e7\u00e3o a Dist\u00e2ncia","Estudos","Funiber","FUNIBER Opini\u00f5es","hack","Internet","mestrado","Opini\u00e3o FUNIBER","Opini\u00f5es Funiber","Seguran\u00e7a cibern\u00e9tica","Seguran\u00e7a de dados","seguran\u00e7a digital","tecnologia","TI","Transforma\u00e7\u00e3o Digital"],"articleSection":["Tecnologias TIC"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack","url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack","name":"Como descobrir um\u00a0hack","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/#website"},"datePublished":"2020-06-22T18:11:12+00:00","dateModified":"2020-06-22T18:11:12+00:00","description":"Os\u00a0ataques cibern\u00e9ticos\u00a0s\u00e3o\u00a0uma preocupa\u00e7\u00e3o de empresas e indiv\u00edduos contra a amea\u00e7a de roubo de dados ou OTR\u00a0como consequ\u00eancias.","breadcrumb":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/06\/22\/funiber-descobrir-hack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/blogs.funiber.org\/pt"},{"@type":"ListItem","position":2,"name":"Como descobrir um\u00a0hack"}]},{"@type":"WebSite","@id":"https:\/\/blogs.funiber.org\/pt\/#website","url":"https:\/\/blogs.funiber.org\/pt\/","name":"FuniBlogs - FUNIBER","description":"","publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blogs.funiber.org\/pt\/#organization","name":"FuniBlogs - FUNIBER","url":"https:\/\/blogs.funiber.org\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","contentUrl":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","width":1,"height":1,"caption":"FuniBlogs - FUNIBER"},"image":{"@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/funiber","https:\/\/twitter.com\/FUNIBER","https:\/\/www.instagram.com\/funiber_becas","https:\/\/www.youtube.com\/user\/funiber","https:\/\/www.linkedin.com\/company\/funiber"]},{"@type":"Person","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d","name":"Michelle","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","caption":"Michelle"},"url":"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira"}]}},"jetpack_featured_media_url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2020\/06\/funiber-hack-seguranca.jpg","jetpack_shortlink":"https:\/\/wp.me\/p7ee1t-5P7","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/22389"}],"collection":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/comments?post=22389"}],"version-history":[{"count":1,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/22389\/revisions"}],"predecessor-version":[{"id":22391,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/22389\/revisions\/22391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media\/22390"}],"wp:attachment":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media?parent=22389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/categories?post=22389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/tags?post=22389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}