{"id":25886,"date":"2022-02-21T04:57:24","date_gmt":"2022-02-21T09:57:24","guid":{"rendered":"https:\/\/blogs.funiber.org\/pt\/?p=25886"},"modified":"2022-02-18T05:01:08","modified_gmt":"2022-02-18T10:01:08","slug":"funiber-ransomware-virus","status":"publish","type":"post","link":"https:\/\/www.funiber.blog\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus","title":{"rendered":"O que \u00e9 um ransomware?"},"content":{"rendered":"<h2><span style=\"font-weight: 400;\">Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware<\/span><\/h2>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">Os dispositivos eletr\u00f4nicos que s\u00e3o usados diariamente cont\u00eam uma grande quantidade de informa\u00e7\u00f5es que s\u00e3o protegidas por senhas. Entretanto, isto n\u00e3o impede um ataque cibern\u00e9tico por um v\u00edrus que poderia colocar esta informa\u00e7\u00e3o em risco.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Este \u00e9 o caso do v\u00edrus conhecido como <\/span><b>ransomware<\/b><span style=\"font-weight: 400;\">. \u00c9 um malware que ainda \u00e9 desconhecido para a maioria da popula\u00e7\u00e3o, mas que pode ser letal.\u00a0 Sua principal fun\u00e7\u00e3o \u00e9 impedir o acesso \u00e0s informa\u00e7\u00f5es armazenadas em um dispositivo a fim de destru\u00ed-lo ou dissemin\u00e1-lo.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sua dissemina\u00e7\u00e3o pode ocorrer por meio de campanhas de spam, configura\u00e7\u00f5es incorretas de software, atualiza\u00e7\u00f5es falsas, canais de download enganosos e muito mais.\u00a0\u00a0<\/span><\/p>\n<p><b>Caminhos para afetar o dispositivo<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Um dos m\u00e9todos que os cibercriminosos utilizam para afetar sua v\u00edtima \u00e9 explorar quaisquer lacunas na seguran\u00e7a do software. Os criadores deste v\u00edrus sabem com certeza onde se encontram as falhas no sistema de seguran\u00e7a.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Outro m\u00e9todo \u00e9 fazer o login usando credenciais de acesso que s\u00f3 o administrador possui. Isto \u00e9 conseguido por meio de golpes como o phishing que \u00e9 frequentemente utilizado em contas falsas simulando a dos bancos.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Al\u00e9m disso, eles podem recorrer a e-mails falsos que cont\u00eam links para supostas faturas ou documentos, mas na verdade instalam o malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Em rela\u00e7\u00e3o ao acima mencionado, outra rota frequentemente utilizada s\u00e3o os e-mails de spam que incluem sites ou arquivos contendo malware. Hoje em dia, os e-mails podem ser filtrados, mas muitas pessoas ainda acabam baixando o v\u00edrus.<\/span><\/p>\n<p><b>Formas de prote\u00e7\u00e3o<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Uma das principais recomenda\u00e7\u00f5es \u00e9 proteger o sistema o melhor poss\u00edvel e permanecer vigilante para n\u00e3o se deixar enganar pelos m\u00e9todos descritos acima. \u00c9 importante permanecer alerta e desconfiado das mensagens que voc\u00ea recebe, seja por e-mail, SMS, redes sociais, entre outros.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Da mesma forma, uma boa estrat\u00e9gia \u00e9 segmentar redes ou <\/span><i><span style=\"font-weight: 400;\">subnetting<\/span><\/i><span style=\"font-weight: 400;\">. Isto evita a exposi\u00e7\u00e3o de servi\u00e7os internos e ajuda a reduzir a vulnerabilidade.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finalmente, cabe destacar que a <\/span><a href=\"https:\/\/www.funiber.org.br\" target=\"_blank\" rel=\"noopener\"><b>FUNIBER<\/b><\/a><span style=\"font-weight: 400;\"> patrocina in\u00fameros cursos para aprender mais sobre tecnologia e intelig\u00eancia artificial. Alguns destes programas s\u00e3o o <\/span><a href=\"https:\/\/www.funiber.org.br\/mestrado-em-direcao-estrategica-em-engenharia-de-software\" target=\"_blank\" rel=\"noopener\"><b>Mestrado em Dire\u00e7\u00e3o Estrat\u00e9gica em Engenharia de Software<\/b><\/a><b> e o <\/b><span style=\"font-weight: 400;\">Mestrado em Dire\u00e7\u00e3o Estrat\u00e9gica em Tecnologias Software<\/span><a href=\"https:\/\/www.funiber.org.br\/infraestrutura-tecnologica-de-software\"><b>.<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Fonte:<\/span> <a href=\"https:\/\/www.lavanguardia.com\/tecnologia\/20210825\/7676276\/que-es-ransomware-malware-ciberataque-formulas-evitar-dispositivos-pmv.html\" target=\"_blank\" rel=\"noopener\"><b>Qu\u00e9 es un ransomware y f\u00f3rmulas para evitar que da\u00f1en nuestro dispositivo<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Foto: Todos os direitos reservados.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware<\/p>\n","protected":false},"author":10,"featured_media":25887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[6],"tags":[1802,1242,855,285,408,119,248,609,255,2597,26,2642],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>O que \u00e9 um ransomware?<\/title>\n<meta name=\"description\" content=\"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"O que \u00e9 um ransomware?\" \/>\n<meta property=\"og:description\" content=\"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\" \/>\n<meta property=\"og:site_name\" content=\"FuniBlogs - FUNIBER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/funiber\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-21T09:57:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-18T10:01:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2022\/02\/funiber-ransomware-tecnologia.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"570\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:site\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\"},\"author\":{\"name\":\"Michelle\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\"},\"headline\":\"O que \u00e9 um ransomware?\",\"datePublished\":\"2022-02-21T09:57:24+00:00\",\"dateModified\":\"2022-02-18T10:01:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\"},\"wordCount\":427,\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"keywords\":[\"Ataque Cibern\u00e9tico\",\"Bolsas\",\"Doutorado\",\"Educa\u00e7\u00e3o\",\"Educa\u00e7\u00e3o a Dist\u00e2ncia\",\"Estudos\",\"Funiber\",\"Intelig\u00eancia Artificial\",\"Opini\u00f5es Funiber\",\"ransomware\",\"tecnologia\",\"v\u00edrus\"],\"articleSection\":[\"Tecnologias TIC\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\",\"name\":\"O que \u00e9 um ransomware?\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\"},\"datePublished\":\"2022-02-21T09:57:24+00:00\",\"dateModified\":\"2022-02-18T10:01:08+00:00\",\"description\":\"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/blogs.funiber.org\/pt\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"O que \u00e9 um ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"name\":\"FuniBlogs - FUNIBER\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\",\"name\":\"FuniBlogs - FUNIBER\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"contentUrl\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"width\":1,\"height\":1,\"caption\":\"FuniBlogs - FUNIBER\"},\"image\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/funiber\",\"https:\/\/twitter.com\/FUNIBER\",\"https:\/\/www.instagram.com\/funiber_becas\",\"https:\/\/www.youtube.com\/user\/funiber\",\"https:\/\/www.linkedin.com\/company\/funiber\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\",\"name\":\"Michelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"caption\":\"Michelle\"},\"url\":\"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"O que \u00e9 um ransomware?","description":"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"pt_BR","og_type":"article","og_title":"O que \u00e9 um ransomware?","og_description":"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware","og_url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus","og_site_name":"FuniBlogs - FUNIBER","article_publisher":"https:\/\/www.facebook.com\/funiber","article_published_time":"2022-02-21T09:57:24+00:00","article_modified_time":"2022-02-18T10:01:08+00:00","og_image":[{"width":570,"height":350,"url":"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2022\/02\/funiber-ransomware-tecnologia.jpg","type":"image\/jpeg"}],"author":"Michelle","twitter_card":"summary_large_image","twitter_creator":"@FUNIBER","twitter_site":"@FUNIBER","twitter_misc":{"Escrito por":"Michelle","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#article","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus"},"author":{"name":"Michelle","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d"},"headline":"O que \u00e9 um ransomware?","datePublished":"2022-02-21T09:57:24+00:00","dateModified":"2022-02-18T10:01:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus"},"wordCount":427,"publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"keywords":["Ataque Cibern\u00e9tico","Bolsas","Doutorado","Educa\u00e7\u00e3o","Educa\u00e7\u00e3o a Dist\u00e2ncia","Estudos","Funiber","Intelig\u00eancia Artificial","Opini\u00f5es Funiber","ransomware","tecnologia","v\u00edrus"],"articleSection":["Tecnologias TIC"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus","url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus","name":"O que \u00e9 um ransomware?","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/#website"},"datePublished":"2022-02-21T09:57:24+00:00","dateModified":"2022-02-18T10:01:08+00:00","description":"Com a cont\u00ednua dissemina\u00e7\u00e3o de v\u00edrus de computador, h\u00e1 agora uma variedade de tipos diferentes de amea\u00e7as, como o ransomware","breadcrumb":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2022\/02\/21\/funiber-ransomware-virus#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/blogs.funiber.org\/pt"},{"@type":"ListItem","position":2,"name":"O que \u00e9 um ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.funiber.org\/pt\/#website","url":"https:\/\/blogs.funiber.org\/pt\/","name":"FuniBlogs - FUNIBER","description":"","publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blogs.funiber.org\/pt\/#organization","name":"FuniBlogs - FUNIBER","url":"https:\/\/blogs.funiber.org\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","contentUrl":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","width":1,"height":1,"caption":"FuniBlogs - FUNIBER"},"image":{"@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/funiber","https:\/\/twitter.com\/FUNIBER","https:\/\/www.instagram.com\/funiber_becas","https:\/\/www.youtube.com\/user\/funiber","https:\/\/www.linkedin.com\/company\/funiber"]},{"@type":"Person","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d","name":"Michelle","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","caption":"Michelle"},"url":"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira"}]}},"jetpack_featured_media_url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/funiber-ransomware-tecnologia.jpg","jetpack_shortlink":"https:\/\/wp.me\/p7ee1t-6Jw","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/25886"}],"collection":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/comments?post=25886"}],"version-history":[{"count":1,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/25886\/revisions"}],"predecessor-version":[{"id":25888,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/25886\/revisions\/25888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media\/25887"}],"wp:attachment":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media?parent=25886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/categories?post=25886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/tags?post=25886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}