{"id":4168,"date":"2024-09-11T17:01:55","date_gmt":"2024-09-11T11:31:55","guid":{"rendered":"https:\/\/quickheal.co.in\/knowledge-centre\/?p=4168"},"modified":"2024-11-25T15:53:42","modified_gmt":"2024-11-25T10:23:42","slug":"what-is-stalkerware","status":"publish","type":"post","link":"https:\/\/www.quickheal.co.in\/knowledge-centre\/what-is-stalkerware\/","title":{"rendered":"What is Stalkerware? Identification and Removal Guide"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4168\" class=\"elementor elementor-4168\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2abe0b68 e-flex e-con-boxed e-con e-parent\" data-id=\"2abe0b68\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5d2c5c51 elementor-widget elementor-widget-text-editor\" data-id=\"5d2c5c51\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p>Imagine someone watching your every move on the internet. Every click, every site visit, every purchase \u2014 someone is tracking your online life! Scary, right?<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>This is the job of a stalkerware! It can enable anyone to access your devices from afar and track your every move. To protect yourself from it, you must learn about stalkerware, how it gets on your device, and how to protect yourself effectively.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">What is stalkerware?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>Stalkerware<\/strong> refers to secretive software that is installed on a device without the user&#8217;s consent, enabling someone to spy on them. This intrusive software can monitor various aspects such as text messages, phone calls, and location, posing a significant threat to the user&#8217;s privacy.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">How Does Stalkerware Get on Your Phone?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Usually, someone with access to your phone installs it secretly. It&#8217;s often done by someone you know, like a partner or friend who shouldn&#8217;t be snooping.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">How Can You Detect Stalkerware On Your Device?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Watch out for the following signs to identify whether your device has stalkerware:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list {\"ordered\":true} --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\"><!-- wp:list-item --><\/ol>\n<\/li>\n<\/ol>\n<p><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><\/span><\/p>\n<ol style=\"\">\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Battery Draining Fast:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"> If you notice that your phone battery is running out faster than usual, it could be a sign that stalkerware is running in the background.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Data Usage Spike:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"> If you see a sudden and unexplained increase in your data usage, it could be an indication that someone is using stalkerware to transmit your information.<\/span><\/li>\n<li style=\"\"><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Phone Acting Unusual:<\/b> If your phone is behaving strangely, such as being slow, overheating, or crashing frequently, it may be due to stalkerware.<\/span><\/li>\n<li style=\"\"><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Strange Apps or Settings:<\/b> If you spot any unfamiliar apps that you didn&#8217;t download, especially ones disguised under normal-looking names, it could be stalkerware.<\/span><\/li>\n<\/ol>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">Is Stalkerware Illegal?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>Stalkerware software<\/strong> is illegal due to its invasive nature and breach of privacy. Installing it on anyone&#8217;s device without consent violates laws against unauthorized surveillance and privacy rights, leading to serious consequences such as fines and imprisonment.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">Types of Stalkerware Apps and Their Common Functionalities<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Here are the most common types of stalkerware that you can find on your device:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">Monitor Communications Apps<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>These apps are designed to intercept and monitor text messages, emails, call logs, and even social media interactions. They can also record phone conversations and take screenshots of messages and chats.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">Track Location Apps<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Location-tracking apps use the device&#8217;s GPS to monitor and report the user&#8217;s real-time location, allowing the person using the stalkerware to track the victim&#8217;s movements.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3 class=\"wp-block-heading\">Steal Files and Intimate Data Apps<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>These apps can access and steal photos, videos, documents, and other files stored on the device. They can also activate the device&#8217;s microphone and camera to capture audio and video without the owner&#8217;s knowledge.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">How to Remove Stalkerware From Android Phones and Other Devices<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Here are the steps you must follow to remove Stalkerware from your device:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\"><!-- wp:list-item --><\/ul>\n<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Backup Your Data:<\/strong> Before attempting to remove stalkerware, back up your important data.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Check for Suspicious Apps:<\/strong> Go through the list of your installed apps and remove any suspicious or unfamiliar apps.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Factory Reset:<\/strong> Performing a factory reset can remove most forms of stalkerware. However, this will erase all data on your device, so ensure you have a backup.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Use Security Software:<\/strong> Install and run trusted security apps and software like <a href=\"https:\/\/www.quickheal.co.in\/free-ransomware-decryption-tool\" target=\"_blank\" rel=\"noreferrer noopener\" style=\"\">Quick Heal with malware protection<\/a> to scan and remove malicious software from your device.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Change Passwords:<\/strong> After you uninstall the stalkerware, make sure to change all your passwords, including your device password, email accounts, and any other important services.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ul class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ul class=\"wp-block-list\">\n<li><strong>Update Your Device:<\/strong> Keep your device&#8217;s operating system and apps updated to protect against vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">How to Prevent Stalkerware From Entering Your Device?<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Now that you know stalkerware and its potential damages, you must protect your device against it. Here are a few best practices you must follow to ensure the safety and security of your device from malicious stalkerware:<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list {\"ordered\":true} --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\"><!-- wp:list-item --><\/ol>\n<\/li>\n<\/ol>\n<p><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><\/span><\/p>\n<ol style=\"\">\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Secure Your Device:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"> Use strong passwords and enable two-factor authentication wherever possible.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Be Cautious With Downloads:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b> <\/b>Only download apps from official online stores like Google Play and Apple App Store.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Regular Security Checks:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b> <\/b>Periodically check your device for unusual apps and run security scans.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Keep Software Updated<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>: <\/b>Regularly update your operating system and apps to protect against vulnerabilities.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Educate Yourself:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"> Stay informed about the latest security threats and how to protect your devices.<\/span><\/li>\n<li style=\"\"><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"><b>Limit Physical Access:<\/b><\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\"> Be mindful of who has access to your devices, especially those who may install stalkerware.<\/span><\/li>\n<\/ol>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2 class=\"wp-block-heading\">Stay Safe Online With Quick Heal!<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:list {\"ordered\":true} --><\/p>\n<ol>\n<li><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\">Have you ever experienced unusual behaviour on your device that made you suspect <\/span><span style=\"color: var(--color-default); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align);\">stalkerware<\/span><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\">?<\/span><\/li>\n<li>What steps do you take to ensure your device&#8217;s security against such threats?<\/li>\n<li><span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align);\">How often do you update your device&#8217;s operating system and apps?<\/span><\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- wp:list-item --><\/p>\n<ol class=\"wp-block-list\">\n<li style=\"list-style-type: none;\">\n<ol class=\"wp-block-list\">\n<\/ol>\n<\/li>\n<\/ol>\n<p><!-- \/wp:list-item --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>Stalkerware<\/strong> is a serious threat to personal privacy and security. Detecting and removing this malicious software can be difficult, but it&#8217;s crucial for maintaining control over your device and data. Regular security practices, such as updating software and using strong passwords, can help prevent stalkerware.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>If you suspect your device is compromised, immediately remove the software and secure your device. Protect your devices from a wide range of threats, including stalkerware, with Quick Heal Total Security. This comprehensive solution ensures the security and privacy of your devices.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Get <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\/\" style=\"\"><mark style=\"\">Quick Heal Total Security<\/mark><\/a> today for just \u20b93,165.00 for a 3-year subscription<\/p>\n<p dir=\"ltr\" data-pm-slice=\"1 1 []\"><strong>Related Products: <\/strong><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-internet-security\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-factors-click-bind=\"false\">Quick Heal Internet Security<\/a><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-mac\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-factors-click-bind=\"false\">Quick Heal Total Security for Mac<\/a><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-home-server-antivirus\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-factors-click-bind=\"false\">Quick Heal AntiVirus for Server<\/a><\/p>\n<p dir=\"ltr\" style=\"line-height: 1.38;\" data-line-height-align=\"1.38\"><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-factors-click-bind=\"false\">Quick Heal Total Security for Android<\/a><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-mobile-security\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-factors-click-bind=\"false\">Quick Heal Mobile Security<\/a><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Imagine someone watching your every move on the internet. Every click, every site visit, every purchase \u2014 someone is tracking your online life! Scary, right? This is the job of a stalkerware! It can enable anyone to access your devices from afar and track your every move. To protect yourself from it, you must learn [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4175,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4168","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4168"}],"collection":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/comments?post=4168"}],"version-history":[{"count":23,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4168\/revisions"}],"predecessor-version":[{"id":4793,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4168\/revisions\/4793"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media\/4175"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media?parent=4168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/categories?post=4168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/tags?post=4168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}