
{"id":931,"date":"2021-02-15T18:03:08","date_gmt":"2021-02-15T17:03:08","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=931"},"modified":"2021-02-15T18:03:10","modified_gmt":"2021-02-15T17:03:10","slug":"attaque-informatique-si-mon-mail-a-ete-pirate-que-faire","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/","title":{"rendered":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.malekal.com\/wp-content\/uploads\/compte-mail-pirate-que-faire.jpg\" alt=\"R\u00e9sultat de recherche d'images pour &quot;mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?&quot;\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>Plus de trois milliards de logins et de mots de passe, li\u00e9s \u00e0 des comptes Gmail, Hotmail, Netflix et LinkedIn, ont \u00e9t\u00e9 divulgu\u00e9s. Beaucoup d\u2019internautes doivent changer leur mot de passe et prendre de nouvelles habitudes.<\/strong><\/p>\n\n\n\n<p>L\u2019adresse mail est la porte d\u2019entr\u00e9e de nombreux sites fr\u00e9quent\u00e9s r\u00e9guli\u00e8rement. Savoir que sa\u00a0bo\u00eete email a \u00e9t\u00e9 pirat\u00e9e\u00a0n\u2019est pas une bonne nouvelle. Des solutions existent pour \u00e9viter que cela ne se reproduise.<\/p>\n\n\n\n<p><strong>Que s\u2019est-il pass\u00e9&nbsp;?<\/strong><\/p>\n\n\n\n<p>Une base de donn\u00e9es regroupant 3,2&nbsp;milliards d\u2019identifiants et de mots de passe vol\u00e9s a \u00e9t\u00e9 mise en ligne la semaine derni\u00e8re. Elle est le fruit d\u2019une compilation de fuites pr\u00e9c\u00e9dentes qui touchaient 15,2&nbsp;milliards de comptes pirat\u00e9s et plus de 2,5&nbsp;milliards d\u2019e-mails uniques, selon le site&nbsp;<em>Cybernews<\/em>.<\/p>\n\n\n\n<p><strong>Comment savoir si vous \u00eates concern\u00e9&nbsp;?<\/strong><\/p>\n\n\n\n<p>Le site&nbsp;<em>Cybernews<\/em>&nbsp;propose de le v\u00e9rifier en tapant votre adresse e-mail dans un outil de recherche. La r\u00e9ponse est en anglais mais vous comprendrez vite si vous \u00eates concern\u00e9.<\/p>\n\n\n\n<p><strong>Que faire&nbsp;?<\/strong><\/p>\n\n\n\n<p>Changer son mot de passe. Puis sur les sites plus sensibles comme votre banque en ligne ou votre messagerie, il faut activer l\u2019authentification \u00e0 deux facteurs. &nbsp;C\u2019est-\u00e0-dire un code qu\u2019on re\u00e7oit sur son t\u00e9l\u00e9phone en plus du mot de passe classique&nbsp;\u200b, d\u00e9crypte G\u00e9r\u00f4me Billois, expert en cybers\u00e9curit\u00e9 pour le cabinet Wavestone.<\/p>\n\n\n\n<p><strong>Comment g\u00e9rer mes mots de passe&nbsp;?<\/strong><\/p>\n\n\n\n<p>En utilisant un coffre-fort de mot de passe. &nbsp;Il va les stocker et les remplir automatiquement quand on va aller sur le site.&nbsp; Autre astuce pour des sites sans importance mais qui n\u00e9cessite de cr\u00e9er un compte : &nbsp;On peut tr\u00e8s bien mettre n\u2019importe quel mot de passe \u00e0 chaque fois, et utiliser la proc\u00e9dure de perte du mot de passe. Elle permet en moins d\u2019une minute souvent de retrouver l\u2019acc\u00e8s au site.&nbsp;<\/p>\n\n\n\n<p><strong>Est-ce possible d\u2019attaquer les plateformes&nbsp;?<\/strong><\/p>\n\n\n\n<p>Difficilement. \u00a0Bien souvent ce ne sont pas directement les plateformes qui ont perdu le mot de passe mais d\u2019autres sites multiples sur lesquelles les gens avaient cr\u00e9\u00e9 des comptes avec leur adresse Gmail ou Hotmail et souvent le m\u00eame mot de passe, partout\u00a0\u200b, explique l\u2019expert en cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Avec Ouest France<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus de trois milliards de logins et de mots de passe, li\u00e9s \u00e0 des comptes Gmail, Hotmail, Netflix et LinkedIn, ont \u00e9t\u00e9 divulgu\u00e9s. Beaucoup d\u2019internautes doivent changer leur mot de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":932,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,71,11],"tags":[],"class_list":["post-931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-astuce","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store\" \/>\n<meta property=\"og:description\" content=\"Plus de trois milliards de logins et de mots de passe, li\u00e9s \u00e0 des comptes Gmail, Hotmail, Netflix et LinkedIn, ont \u00e9t\u00e9 divulgu\u00e9s. Beaucoup d\u2019internautes doivent changer leur mot de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-15T17:03:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-15T17:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"265\" \/>\n\t<meta property=\"og:image:height\" content=\"119\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?\",\"datePublished\":\"2021-02-15T17:03:08+00:00\",\"dateModified\":\"2021-02-15T17:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/\"},\"wordCount\":415,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-28.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Astuce\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/\",\"name\":\"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-28.jpg\",\"datePublished\":\"2021-02-15T17:03:08+00:00\",\"dateModified\":\"2021-02-15T17:03:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-28.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/pt-28.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/02\\\/15\\\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/","og_locale":"fr_FR","og_type":"article","og_title":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store","og_description":"Plus de trois milliards de logins et de mots de passe, li\u00e9s \u00e0 des comptes Gmail, Hotmail, Netflix et LinkedIn, ont \u00e9t\u00e9 divulgu\u00e9s. Beaucoup d\u2019internautes doivent changer leur mot de [&hellip;]","og_url":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-02-15T17:03:08+00:00","article_modified_time":"2021-02-15T17:03:10+00:00","og_image":[{"width":265,"height":119,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?","datePublished":"2021-02-15T17:03:08+00:00","dateModified":"2021-02-15T17:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/"},"wordCount":415,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg","articleSection":["Actualit\u00e9","Astuce","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/","url":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/","name":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg","datePublished":"2021-02-15T17:03:08+00:00","dateModified":"2021-02-15T17:03:10+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/02\/pt-28.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/02\/15\/attaque-informatique-si-mon-mail-a-ete-pirate-que-faire\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"Attaque informatique : Si mon mail a \u00e9t\u00e9 pirat\u00e9, que faire ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=931"}],"version-history":[{"count":1,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/931\/revisions"}],"predecessor-version":[{"id":933,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/931\/revisions\/933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/932"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}