{"id":1817,"date":"2008-04-07T21:15:57","date_gmt":"2008-04-07T20:15:57","guid":{"rendered":"https:\/\/www.tecnomagazine.it\/tech\/2008-04-07\/report-settimanale-sul-malware-4\/"},"modified":"2008-04-07T21:15:57","modified_gmt":"2008-04-07T20:15:57","slug":"report-settimanale-sul-malware-4","status":"publish","type":"post","link":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/","title":{"rendered":"Report Settimanale sul Malware"},"content":{"rendered":"<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" alt=\"viruspc.jpg\" align=\"left\" border=\"0\" height=\"102\" width=\"240\" \/>\r\n<div class=\"4032636bd480207a9641f06a0353772e\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<!--COOKIE_POLICY_BEGIN-->\r\n<script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\r\n<!-- Tecnomagine Grande -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4884298544160548\"\r\n     data-ad-slot=\"6528327022\"\r\n     data-ad-format=\"auto\"><\/ins>\r\n<script>\r\n(adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\r\n<!--COOKIE_POLICY_END-->\n<\/div>\n\r\nSecondo i dati raccolti dai laboratori di <em><strong>Panda Security<\/strong><\/em>, il <strong>programma spia <em>Virtumonde<\/em><\/strong> \u00e8 stata <strong>la minaccia pi\u00f9 attiva della scorsa settimana<\/strong>.<\/p>\n<p>Il <strong>worm<\/strong> <strong><em>Bagle.HX<\/em><\/strong> e l\u2019<strong>adware <em>NaviPromo<\/em><\/strong><em> <\/em>occupano rispettivamente il <strong>secondo e il terzo posto della classifica<\/strong>.<\/p>\n<p><strong><em> Top 10 TotalScan<\/em><\/strong>:<\/p>\n<ol>\n<li><strong> Spyware\/Virtumonde<\/strong><\/li>\n<li><strong>W32\/Bagle.HX.worm\u00a0<\/strong><\/li>\n<li><strong>Adware\/NaviPromo\u00a0<\/strong><\/li>\n<li><strong>Adware\/Comet\u00a0<\/strong><\/li>\n<li><strong>W32\/Bagle.RP.worm\u00a0<\/strong><\/li>\n<li><strong>W32\/Puce.E.worm\u00a0<\/strong><\/li>\n<li><strong>Adware\/Zango<\/strong><\/li>\n<li><strong>Adware\/Lop\u00a0<\/strong><\/li>\n<li><strong>W32\/Bagle.QV.worm\u00a0<\/strong><\/li>\n<li><strong>Adware\/Starware <\/strong><\/li>\n<\/ol>\n<p>Tra i codici apparsi, i laboratori di <em><strong>Panda Security<\/strong><\/em> evidenziano il <strong>Trojan <em>QQHelper.Z<\/em><\/strong>, l\u2019<strong>adware <em>AntispywareMaster<\/em><\/strong> ed il <strong>worm <em>Rungbu.D<\/em><\/strong>.<\/p>\n<p><em><strong>QQHelper.Z<\/strong><\/em> \u00e8 <strong>progettato per scaricare due rootkit sui computer<\/strong> per celare la propria attivit\u00e0 e rendere pi\u00f9 difficile l\u2019individuazione. Questo Trojan <strong>si connette ad una pagina web e realizza una serie di modifiche al sistema<\/strong>, inclusa l\u2019<strong>aggiunta di un link nella cartella \u201cPreferiti\u201d<\/strong>.<\/p>\n<p>L\u2019<strong>adware <em>AntispywareMaster<\/em><\/strong> <strong>si finge un programma antispyware per ingannare l\u2019utente ad installarlo ed eseguirlo<\/strong> sul proprio PC. Inoltre, <strong>crea accessi diretti nel menu Start e sul Desktop<\/strong>. Quando \u00e8 eseguito, <strong>simula un\u2019analisi del computer in cerca di malware, mostrando un risultato fittizio della rilevazione<\/strong>.<br \/>\n<strong><!--more--><\/strong> Luis Corrons, direttore tecnico dei laboratori di Panda Security afferma \u201c<em>quando abbiamo analizzato questa minaccia, abbiamo trovato un file contenente informazioni relative alle infezioni da visualizzare. Quindi, questo \u201cantispyware\u201d conosce gi\u00e0 i codici maligni che rilever\u00e0, prima ancora che abbia iniziato l\u2019analisi del computer! \u00c8 evidente che si tratti di un programma pericoloso<\/em>.\u201d<\/p>\n<p>Una volta terminata la verifica, l\u2019utente, se cercher\u00e0 di eliminare le minacce, verr\u00e0 condotto ad una pagina web sulla quale potr\u00e0 acquistare il prodotto.<\/p>\n<p>Il <strong>worm <em>Rungbu.D<\/em><\/strong> \u00e8 <strong>progettato per copiare se stesso su tutti i drive del sistema<\/strong>. Inoltre, <strong>modifica alcune chiavi del registro di Windows per realizzare azioni dannose, come nascondere le estensioni dei file, cambiare le icone di Microsoft Word con altre contenute nel codice del worm ed eseguirsi ogni volta che il sistema viene riavviato<\/strong>.<\/p>\n<p>I dati dimostrano che pi\u00f9 del 23% di computer dotati di una soluzione di sicurezza ed oltre il 32% di PC non protetti, sono stati colpiti da malware.<\/p>\n<p>Da <a href=\"http:\/\/www.fullpress.it\"><em><strong>FullPress.it<\/strong><\/em><\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Secondo i dati raccolti dai laboratori di Panda Security, il<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50,14],"tags":[78,186,61],"class_list":["post-1817","post","type-post","status-publish","format-standard","hentry","category-web","category-software","tag-malware","tag-trojan","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Report Settimanale sul Malware - TecnoMagazine<\/title>\n<meta name=\"description\" content=\"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report Settimanale sul Malware - TecnoMagazine\" \/>\n<meta property=\"og:description\" content=\"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoMagazine\" \/>\n<meta property=\"article:published_time\" content=\"2008-04-07T20:15:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg\" \/>\n<meta name=\"author\" content=\"Ambra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:site\" content=\"@tecnomagazineit\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ambra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/\"},\"author\":{\"name\":\"Ambra\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"headline\":\"Report Settimanale sul Malware\",\"datePublished\":\"2008-04-07T20:15:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/\"},\"wordCount\":348,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"keywords\":[\"malware\",\"trojan\",\"virus\"],\"articleSection\":[\"Dal web\",\"Software\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/\",\"name\":\"Report Settimanale sul Malware - TecnoMagazine\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"datePublished\":\"2008-04-07T20:15:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\"},\"description\":\"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\",\"contentUrl\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/wp-content\\\/uploads\\\/2008\\\/02\\\/viruspc.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/1817\\\/report-settimanale-sul-malware-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Report Settimanale sul Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/\",\"name\":\"TecnoMagazine\",\"description\":\"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/#\\\/schema\\\/person\\\/cc264ed84688e010b17b72f0a5fd43ef\",\"name\":\"Ambra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g\",\"caption\":\"Ambra\"},\"url\":\"https:\\\/\\\/www.tecnomagazine.it\\\/tech\\\/author\\\/ambra\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report Settimanale sul Malware - TecnoMagazine","description":"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/","og_locale":"it_IT","og_type":"article","og_title":"Report Settimanale sul Malware - TecnoMagazine","og_description":"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm","og_url":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/","og_site_name":"TecnoMagazine","article_published_time":"2008-04-07T20:15:57+00:00","og_image":[{"url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","type":"","width":"","height":""}],"author":"Ambra","twitter_card":"summary_large_image","twitter_creator":"@tecnomagazineit","twitter_site":"@tecnomagazineit","twitter_misc":{"Scritto da":"Ambra","Tempo di lettura stimato":"2 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#article","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/"},"author":{"name":"Ambra","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"headline":"Report Settimanale sul Malware","datePublished":"2008-04-07T20:15:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/"},"wordCount":348,"commentCount":0,"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","keywords":["malware","trojan","virus"],"articleSection":["Dal web","Software"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/","url":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/","name":"Report Settimanale sul Malware - TecnoMagazine","isPartOf":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#primaryimage"},"image":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","datePublished":"2008-04-07T20:15:57+00:00","author":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef"},"description":"Secondo i dati raccolti dai laboratori di Panda Security, il programma spia Virtumonde \u00e8 stata la minaccia pi\u00f9 attiva della scorsa settimana. Il worm","breadcrumb":{"@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#primaryimage","url":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg","contentUrl":"https:\/\/www.tecnomagazine.it\/tech\/wp-content\/uploads\/2008\/02\/viruspc.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tecnomagazine.it\/tech\/1817\/report-settimanale-sul-malware-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tecnomagazine.it\/tech\/"},{"@type":"ListItem","position":2,"name":"Report Settimanale sul Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.tecnomagazine.it\/tech\/#website","url":"https:\/\/www.tecnomagazine.it\/tech\/","name":"TecnoMagazine","description":"Approfondimenti, Tendenze e Innovazioni nel Vasto Universo dell&#039;Informatica e della Tecnologia","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tecnomagazine.it\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/www.tecnomagazine.it\/tech\/#\/schema\/person\/cc264ed84688e010b17b72f0a5fd43ef","name":"Ambra","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b67f75302a24e0a13a9126168729f57f232f4a44fc224f190021c6009c9e41f6?s=96&d=blank&r=g","caption":"Ambra"},"url":"https:\/\/www.tecnomagazine.it\/tech\/author\/ambra\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/comments?post=1817"}],"version-history":[{"count":0,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/posts\/1817\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/media?parent=1817"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/categories?post=1817"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tecnomagazine.it\/tech\/wp-json\/wp\/v2\/tags?post=1817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}