{"id":4482,"date":"2024-10-10T16:53:48","date_gmt":"2024-10-10T11:23:48","guid":{"rendered":"https:\/\/quickheal.co.in\/knowledge-centre\/?p=4482"},"modified":"2025-08-11T13:21:29","modified_gmt":"2025-08-11T07:51:29","slug":"unmasking-the-most-famous-computer-viruses-in-the-cyberworld","status":"publish","type":"post","link":"https:\/\/www.quickheal.co.in\/knowledge-centre\/unmasking-the-most-famous-computer-viruses-in-the-cyberworld\/","title":{"rendered":"Think Your Computer Is Safe? Meet the Most Famous Computer Viruses Ever"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"4482\" class=\"elementor elementor-4482\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-188bf315 e-flex e-con-boxed e-con e-parent\" data-id=\"188bf315\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57f7649d elementor-widget elementor-widget-text-editor\" data-id=\"57f7649d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p><span style=\"font-weight: 400;\">Today, when everything from banking to social networking happens online, threats like the <\/span>computer virus<span style=\"font-weight: 400;\"> are more than just a nuisance; they&#8217;re evolving digital weapons. What started as prank programs in the 1980s has transformed into sophisticated, malicious codes capable of wiping entire servers, stealing identities, and demanding ransoms worth millions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Did you know that every second, there are almost <a href=\"https:\/\/www.avg.com\/en\/signal\/malware-statistics\">190,000<\/a> new malware attacks happening? Thus, the need to understand different types of viruses isn&#8217;t just for cybersecurity professionals; it\u2019s crucial for everyday users, students, and businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Knowing the <\/span>different types of computer viruses<span style=\"font-weight: 400;\">, how they operate, and their historical impact not only strengthens your digital defense but also helps you recognize red flags early. Let\u2019s dive into some of the most famous digital threats that reshaped the cyber landscape.<\/span><\/p>\n<h2><b>Which Is the Most Famous Computer Virus?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">ILOVEYOU is widely regarded as the most famous<\/span><b> <\/b>malware virus<span style=\"font-weight: 400;\"> ever. Why? Because of its massive scale and the simplicity of its deception.<\/span><\/p>\n<ul>\n<li><b>Impact:<\/b><span style=\"font-weight: 400;\"> Infected over <\/span><a href=\"https:\/\/cyber.tap.purdue.edu\/blog\/articles\/the-iloveyou-worm-a-global-crisis\/\" style=\"\">45 million users<\/a><span style=\"font-weight: 400;\"> worldwide in just a few days.<\/span><\/li>\n<li><b>Spread Method:<\/b> Email with the subject &#8220;ILOVEYOU&#8221;.<\/li>\n<li><b>Damage:<\/b> Caused an estimated <a href=\"https:\/\/cyber.tap.purdue.edu\/blog\/articles\/the-iloveyou-worm-a-global-crisis\/\">$10 billion <\/a>in losses.<\/li>\n<li><b>Notoriety:<\/b><span> It targeted emotions, tricking users into opening attachments.<\/span><\/li>\n<\/ul>\n<h2><b>Top 10 Most Famous Computer Viruses of All Time<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Here\u2019s a definitive <\/span>computer virus list <span style=\"font-weight: 400;\">featuring history\u2019s most notorious viruses. This scannable guide gives you the who, what, when, and how of <\/span>all types of computer viruses.<\/p>\n<h3><b>MyDoom<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> MyDoom surfaced in January 2004 and quickly made headlines for its astonishing spread rate. It became the fastest-spreading email worm ever recorded.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Email attachments<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Opened backdoors, launched DDoS attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> Caused over <a href=\"https:\/\/www.okta.com\/identity-101\/mydoom\/\">$38.5 billion<\/a> in damages; fastest-spreading virus ever<\/span><\/li>\n<\/ul>\n<h3><b>ILOVEYOU<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> The ILOVEYOU virus emerged from the Philippines in May 2000 and exploited human curiosity and emotion as its main tool.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Email with &#8220;LOVE-LETTER-FOR-YOU&#8221; attachment<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Overwrote personal files and sent itself to all contacts<\/span><\/li>\n<li style=\"\" aria-level=\"1\"><b style=\"font-weight: 400;\">Impact:<\/b><span style=\"font-weight: 400;\"> Infected over 45 million computers, costing <\/span><a href=\"https:\/\/www.cnn.com\/2020\/05\/01\/tech\/iloveyou-virus-computer-security-intl-hnk\" style=\"\">$10 billion<\/a><\/li>\n<\/ul>\n<h3><b>Code Red<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> Code Red was discovered in July 2001 and was particularly dangerous because it required no user interaction to spread.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Exploited vulnerabilities in Microsoft IIS web servers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Defaced websites, launched attacks on the White House<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> $2.4 billion financial loss<\/span><\/li>\n<\/ul>\n<h3><b>Slammer<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> The SQL Slammer worm appeared in January 2003 and brought global internet traffic to a near halt.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Exploited a vulnerability in Microsoft SQL servers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Caused massive network outages<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span><b>Impact:<\/b><br><\/span><span> Caused $950 million-$1.2 billion economic losses in the first five days<\/span><\/li>\n<\/ul>\n<h3><b>CryptoLocker<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> CryptoLocker marked the arrival of ransomware as a mainstream threat in cybercrime.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Email phishing and malicious downloads<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Encrypted users&#8217; files and demanded ransom<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> Earned over $3 million before it was taken down<\/span><\/li>\n<\/ul>\n<h3><b>Sasser &amp; Netsky<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> These two worms were authored by the same individual, Sven Jaschan, a German teenager, and were released close to each other in <\/span><span style=\"font-weight: 400;\">2004<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Exploited Windows vulnerabilities<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Rebooted computers, disrupted business operations<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> Infected millions globally; caused Delta Airlines flight delays<\/span><\/li>\n<\/ul>\n<h3><b>Conficker<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> Conficker, also known as Downup or Downadup, was one of the most complex and resilient worms of 2008<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Exploited Windows OS flaws and USBs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Created a botnet, downloaded more malware<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b> <span>$9.1 billion<\/span><span> in losses<\/span><\/li>\n<\/ul>\n<h3><b>Storm Worm<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> The Storm Worm emerged in January 2007, using real-world events to trick users into opening infected attachments.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Email disguised as breaking news<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Turned PCs into botnets for spamming<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> $16 billion in losses<\/span><\/li>\n<\/ul>\n<h3><b>Anna Kournikova Virus<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> Named after the famous tennis star, this virus, in 2001, demonstrated how celebrity bait could be used in email-based attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> Email with an image attachment<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Sent itself to all contacts once opened<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b> <span>$17.1 billion<\/span><span> in losses<\/span><\/li>\n<\/ul>\n<h3><b>Stuxnet<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Year Detected:<\/b><span style=\"font-weight: 400;\"> Stuxnet was not an ordinary virus; it was a cyberweapon likely developed by state actors for political sabotage in 2010.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spread Method:<\/b><span> USB drives and zero-day Windows exploits<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>What It Did:<\/b><span> Targeted industrial control systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Impact:<\/b><span> Disrupted Iran\u2019s nuclear program; state-sponsored cyberwarfare tool<\/span><\/li>\n<\/ul>\n<h2><b>Stay Digitally Safe with Quick Heal Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While these <\/span>examples of virus in computer<span style=\"font-weight: 400;\"> history show how devastating digital threats can be, modern solutions like Quick Heal offer proactive defense mechanisms.<\/span><\/p>\n<h3><b>Quick Heal Total Security<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A comprehensive <\/span><a href=\"https:\/\/www.quickheal.co.in\/\">antivirus solution<\/a> <span style=\"font-weight: 400;\">designed to protect your PC, financial data, and personal files.<\/span><\/p>\n<h4><b>GoDeep.AI<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">An AI-powered detection engine that identifies known and unknown threats in real-time using machine learning.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Blocks zero-day attacks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantage:<\/b><span> Continuously adapts to emerging threats<\/span><\/li>\n<\/ul>\n<h4><b>Anti-Ransomware<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Shields files from unauthorized encryption attempts by ransomware.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Automatically backs up files before they\u2019re encrypted<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantage:<\/b><span> Reduces ransomware impact to near-zero<\/span><\/li>\n<\/ul>\n<h4><b>Smart Parenting<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Parental control feature to monitor and restrict online activity for children.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Ensures a child-friendly internet experience<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantage:<\/b><span> Schedule screen time, block categories<\/span><\/li>\n<\/ul>\n<h4><b>Data Backup<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Creates secure backups to restore files in case of virus attacks or accidental deletions.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Recovers your critical files post-attack<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantage:<\/b><span> Peace of mind during cyber emergencies<\/span><\/li>\n<\/ul>\n<h3><b>Quick Heal Internet Security<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ideal for frequent internet users who need extra protection while browsing and shopping online.<\/span><\/p>\n<h4><b>Secure Browsing<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Prevents access to malicious or fraudulent websites.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Blocks fake websites and unsafe links<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advantage:<\/b><span> Shop and bank online with confidence<\/span><\/li>\n<\/ul>\n<h4><b>Phishing Protection<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Detects and neutralizes phishing attempts in real-time.<\/span><\/p>\n<ul>\n<li><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Shields you from login credential theft<\/span><\/li>\n<li><b>Advantage:<\/b><span> Safe email and web experience<\/span><\/li>\n<\/ul>\n<h4><b>Email Safety<\/b><\/h4>\n<h4><span style=\"font-weight: 400;\">Scans email attachments for hidden threats.<\/span><\/h4>\n<ul>\n<li><b>Effectiveness:<\/b><span style=\"font-weight: 400;\"> Blocks infected files from opening<\/span><\/li>\n<li><b>Advantage:<\/b><span> Protects from email-based viruses<\/span><\/li>\n<\/ul>\n<h3><b>Quick Heal Antivirus Pro<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A lightweight yet powerful solution for everyday users.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Usefulness:<\/b><span style=\"font-weight: 400;\"> Shields against malware, spyware, and Trojans<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Everyday Benefit:<\/b><span> Minimal system load while offering maximum protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Specialized Defense:<\/b><span> Stops unauthorized access and keyloggers<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Whether you\u2019re an IT professional or a casual user, understanding all <\/span>types of computer viruses<span style=\"font-weight: 400;\"> helps build resilience in today\u2019s digital landscape. Cyber threats will only continue to grow more sophisticated. But with the right tools like Quick Heal and awareness about the <\/span>computer virus list<span style=\"font-weight: 400;\"> that shaped digital history, you&#8217;re empowered to stay one step ahead.<\/span><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-975e773 elementor-widget elementor-widget-mgz-section-title\" data-id=\"975e773\" data-element_type=\"widget\" data-widget_type=\"mgz-section-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t    <h2 class=\"tx-section-heading mb-30\">\r\n        <span>Frequently Asked Questions<\/span>\r\n    <\/h2>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2f9e8d elementor-widget elementor-widget-mgz-faq-widget\" data-id=\"f2f9e8d\" data-element_type=\"widget\" data-widget_type=\"mgz-faq-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n    <div class=\"faq_wrap\">\r\n        <ul class=\"accordion_box clearfix\">\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What was the first famous computer virus in 2025?                 <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">The first notorious virus of 2025 is Ghost. It is also called the Cring ransomware.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What is the full form of virus?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">VIRUS stands for Vital Information Resources Under Siege, though it's a backronym, it accurately reflects the impact viruses can have.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What are the types of computer viruses?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">There are many, including file infector, macro virus, boot sector virus, polymorphic virus, worms, and trojans. All are part of the umbrella term, <\/span>types of computer viruses<span style=\"font-weight: 400\">.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What is the most harmful computer virus?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">MyDoom holds the record for the most financial damage caused by a virus, estimated at $38.5 billion.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    Which antivirus is best to protect from computer viruses?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p>Quick Heal Total Security<span style=\"font-weight: 400\"> offers industry-leading protection, combining AI-based detection with ransomware defense and smart web safety.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                    <\/ul>\r\n    <\/div>\r\n    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Today, when everything from banking to social networking happens online, threats like the computer virus are more than just a nuisance; they&#8217;re evolving digital weapons. What started as prank programs in the 1980s has transformed into sophisticated, malicious codes capable of wiping entire servers, stealing identities, and demanding ransoms worth millions. Did you know that [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4484,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4482"}],"collection":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/comments?post=4482"}],"version-history":[{"count":32,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4482\/revisions"}],"predecessor-version":[{"id":7927,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/4482\/revisions\/7927"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media\/4484"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media?parent=4482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/categories?post=4482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/tags?post=4482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}