{"id":1142,"date":"2020-11-26T11:45:00","date_gmt":"2020-11-26T16:45:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1142"},"modified":"2020-11-25T21:17:20","modified_gmt":"2020-11-26T02:17:20","slug":"google-play-cybersecurity-woes-continue","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/","title":{"rendered":"Google Play Cybersecurity Woes Continue"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-google-play-is-making-headlines-but-this-time-malware-isn-t-the-problem-there-are-several-apps-which-leak-the-private-information-of-users-and-track-their-activity-even-when-they-switch-devices\">Google Play is making headlines, but this time malware isn&#8217;t the problem. There are several apps which leak the private information of users and track their activity, even when they switch devices.<\/h2>\n\n\n\n<p>The Google Play store is once again battling cybersecurity woes. It\u2019s not the first time and it\u2019s likely not the last, although the most recent glaring offender was <a href=\"https:\/\/www.pwvconsultants.com\/blog\/joker-malware-the-thorn-in-googles-side\/\" target=\"_blank\" rel=\"noreferrer noopener\">the Joker malware program<\/a>. This time there are several apps that are impacted, and it\u2019s not <a href=\"https:\/\/www.pwvconsultants.com\/blog\/malware-is-more-than-just-a-virus\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware<\/a> that\u2019s the problem. This time, specific apps are leaking data that could be used to track users. Even if they switch devices.<\/p>\n\n\n\n<p>The apps in question are Baidu Search Box and Baidu Maps (Baidu is a Chinese-based company akin to Google), which have been downloaded millions of times. While these apps are no longer available for download, anyone who has them on their device is risking exposure. The apps are said to expose information like phone model, screen resolution, MAC address, wireless carrier, network, Android ID, IMSI and IMEI numbers. Some of those things are not horrible to expose (although any exposure is bad), but IMEI can be used to directly track a user. Even if they switch to a new phone, if they keep their number and move their SIM card over, the new device is impacted.<\/p>\n\n\n\n<p>In addition, Homestyler (an interior-decorating app) and an Android SDK called ShareSDK are also offenders of data leakage. Homestyler is still available in Google Play in the U.S. From <a href=\"https:\/\/threatpost.com\/baidu-apps-google-play-data\/161556\/\" target=\"_blank\" rel=\"noreferrer noopener\">ThreatPost<\/a>:<\/p>\n\n\n\n<p>\u201cWhile not a definitive violation of Google\u2019s policy for Android apps, the collection of identifiers, such as the IMSI or MAC address, is discouraged based on Android\u2019s best practice guide,\u201d explained the researchers. \u201cTo prevent data leakage, Android app developers should follow Android\u2019s best practices guide and correctly handle users\u2019 data. Android users should stay informed about the required permissions requested by applications on their devices.\u201d<\/p>\n\n\n\n<p>It is not uncommon for app stores to feature both malicious and legitimate apps which collect user data without consent. In fact, an April 2019 report found that <a href=\"https:\/\/threatpost.com\/millions-of-apps-leak-private-user-data-via-leaky-ad-sdks\/131251\/\" target=\"_blank\" rel=\"noreferrer noopener\">millions of apps leak <\/a>personally identifiable information (name, age, income, contact info, etc.). <\/p>\n\n\n\n<p>The real issue at hand here is the lack of security implemented in application development. This is something we have discussed many times in the past, and the above illustrates exactly why this is important. Not only are unsecure apps leaking personal and\/or tracking information, but users have no idea that it\u2019s happening. That\u2019s a blatant violation of trust and exhibits poor ethical business practices. The people who are impacted by the lack of security are the same people who have no idea that it\u2019s a problem, and therefore may not even know to delete the app from their device.<\/p>\n\n\n\n<p>In this example, it\u2019s Android\u2019s Google Play store that\u2019s the culprit, but that doesn\u2019t mean it doesn\u2019t happen on other operating systems. Apple and Microsoft both have their own sets of privacy and functionality issues as well, this isn\u2019t reserved to Android or Google Play. Which is why we not only discuss the need for developers to ensure security prior to deploying an app, but we also stress that users should verify the apps they download prior to installation. <\/p>\n\n\n\n<p>The bottom line for consumers is that everyone needs to verify everything. Don\u2019t just trust the place you download your apps from, do some research, especially if it\u2019s a new app that only has five reviews. It\u2019s also a good idea to install some security protections on your mobile devices, which do not come with antiviral or antimalware programs on them. Everyone is responsible for their personal devices, so if you don\u2019t want your information exposed, be smart with it!<\/p>\n\n\n\n<p>The bottom line for businesses is that security matters. The news has been ripe with cybersecurity problems for months, which most businesses are starting to address. Which is good, but they should ensure everything is done properly when it comes to app development. Functionality and design are great, but if there\u2019s no security, then the app will fail. If this is a problem your business has encountered in the past and you are unsure of how to fix it, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">hire an expert<\/a>! There\u2019s always someone out there who is a specialist at what you need. Don\u2019t \u201cwing it,\u201d do it right the first time and you\u2019ll reap the rewards of increased user interaction and higher profit margins.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google Play&#8217;s cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.<\/p>\n","protected":false},"author":1,"featured_media":1148,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5],"tags":[1837,1169,1943,1981,1980,1750,1820,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Google Play Cybersecurity Woes Continue - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Google Play&#039;s cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Play Cybersecurity Woes Continue\" \/>\n<meta property=\"og:description\" content=\"Google Play&#039;s cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-26T16:45:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-26T02:17:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1143\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Google Play Cybersecurity Woes Continue\",\"datePublished\":\"2020-11-26T16:45:00+00:00\",\"dateModified\":\"2020-11-26T02:17:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\"},\"wordCount\":758,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png\",\"keywords\":[\"Android\",\"Application Security\",\"AppSec\",\"data leak\",\"Google Play\",\"mobile devices\",\"privacy\",\"Security\"],\"articleSection\":[\"Application Security\",\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\",\"name\":\"Google Play Cybersecurity Woes Continue - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png\",\"datePublished\":\"2020-11-26T16:45:00+00:00\",\"dateModified\":\"2020-11-26T02:17:20+00:00\",\"description\":\"Google Play's cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png\",\"width\":1143,\"height\":1280,\"caption\":\"Image by Teri Comroe from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Play Cybersecurity Woes Continue\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Google Play Cybersecurity Woes Continue - PWV Consultants","description":"Google Play's cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/","og_locale":"en_US","og_type":"article","og_title":"Google Play Cybersecurity Woes Continue","og_description":"Google Play's cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-11-26T16:45:00+00:00","article_modified_time":"2020-11-26T02:17:20+00:00","og_image":[{"width":1143,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png","type":"image\/png"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Google Play Cybersecurity Woes Continue","datePublished":"2020-11-26T16:45:00+00:00","dateModified":"2020-11-26T02:17:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/"},"wordCount":758,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png","keywords":["Android","Application Security","AppSec","data leak","Google Play","mobile devices","privacy","Security"],"articleSection":["Application Security","Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/","url":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/","name":"Google Play Cybersecurity Woes Continue - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png","datePublished":"2020-11-26T16:45:00+00:00","dateModified":"2020-11-26T02:17:20+00:00","description":"Google Play's cybersecurity let in apps that leak data and track users. Businesses must secure their products during development.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/google-1632434_1280.png","width":1143,"height":1280,"caption":"Image by Teri Comroe from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/google-play-cybersecurity-woes-continue\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Google Play Cybersecurity Woes Continue"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1142"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1142"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1142\/revisions"}],"predecessor-version":[{"id":1150,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1142\/revisions\/1150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1148"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}