{"id":9069,"date":"2025-11-20T15:31:49","date_gmt":"2025-11-20T10:01:49","guid":{"rendered":"https:\/\/quickheal.co.in\/knowledge-centre\/?p=9069"},"modified":"2025-11-20T17:09:27","modified_gmt":"2025-11-20T11:39:27","slug":"how-to-perform-a-full-security-audit-on-your-android-phone","status":"publish","type":"post","link":"https:\/\/www.quickheal.co.in\/knowledge-centre\/how-to-perform-a-full-security-audit-on-your-android-phone\/","title":{"rendered":"Step-by-Step Guide: How to Perform a Full Security Audit on Your Android Phone"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9069\" class=\"elementor elementor-9069\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f1111c e-flex e-con-boxed e-con e-parent\" data-id=\"4f1111c\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\" data-core-v316-plus=\"true\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255af72 elementor-widget elementor-widget-text-editor\" data-id=\"255af72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.16.0 - 17-10-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">From banking and shopping to pictures and work, we all depend on our phones for basically everything. It may seem technical, but a security audit is just what it sounds like: a health check for your device. This guide is a step-by-step guide to a full-blown audit you can do yourself at home. You&#8217;ll learn how to bug test applications, things to check on your iPhone or Android, fix issues, and harden <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.quickheal.co.in\/knowledge-centre\/mobile-security-importance-risks-best-practices\/\">mobile security<\/a><\/span><span style=\"font-weight: 400;\"> to keep your data secure.<\/span><\/p><h2><b>Why Performing an Android Security Audit Is Crucial<\/b><\/h2><p><span style=\"font-weight: 400;\">An Android security audit helps you spot risks before they turn into challenges. Android is flexible and open, which is brilliant for choice, but also means you must stay on top of phone security. A proper audit checks your apps, permissions, network behaviour, system updates, and the strength of your everyday habits.<\/span><\/p><h3><b>Common Android Security Threats<\/b><\/h3><p><span style=\"font-weight: 400;\">Here are a few pointers to look for:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Harmful apps masquerading as utilities or games that extract contact lists, messages, or banking credentials.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SMS, email, or messaging apps to phish you and have you give them passwords or OTPs.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A weak screen lock or no biometric protection simply allows physical access to information for a thief.<\/span><\/li><\/ul><h3><b>Risks of Ignoring Security Audits<\/b><\/h3><p><span style=\"font-weight: 400;\">Here are a few pointers to look for:<\/span><\/p><ul><li><span style=\"font-weight: 400;\">Unauthorised payments or transfers from leaked banking details.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identity theft leads to long cleanup processes.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Loss of work files is excruciating if your phone doubles as a business device.<\/span><\/li><\/ul><h2><b>Step 1: Prepare Your Device for the Audit<\/b><\/h2><p><span style=\"font-weight: 400;\">A good audit starts with housekeeping. Back up essential data, enable the proper developer settings for basic checks, and keep trusted Android protection tools handy.<\/span><\/p><h3><b>1. Backup Your Data Safely<\/b><\/h3><p><span style=\"font-weight: 400;\">It is essential to keep the backup:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cloud backup:<\/b><span style=\"font-weight: 400;\"> Leverage the backup that Google provides for contacts, SMS, call history, and settings.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Media backup:<\/b><span style=\"font-weight: 400;\"> Utilise Google Photos or iDrive to save photos and videos.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Local copy:<\/b><span style=\"font-weight: 400;\"> Copy crucial files to a secure computer or an encrypted drive.<\/span><\/li><\/ul><h3><b>2. Enable Developer Options &amp; USB Debugging<\/b><\/h3><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Navigate to Settings \u2192 About phone \u2192 Build number, and tap it 7 times to activate Developer options.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the Developer options, only enable USB debugging when you need to connect to a desktop PC to run analyses. Leave it disabled when you are not using it.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">This step unlocks helpful tools for deeper checks, though you should toggle them responsibly.<\/span><\/p><h3><b>3. Install Essential Tools (like Quick Heal Mobile Security)<\/b><\/h3><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A well-known mobile security android application to check for malware, dangerous configurations, and suspicious activity.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A permission checker to verify which of your apps can access your camera, microphone, location, and SMS.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Go to <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal<\/a><\/span><span style=\"font-weight: 400;\"> to evaluate mobile security services designed for Android users in India.<\/span><\/li><\/ul><h2><b>Step 2: Scan and Test Your Android Apps<\/b><\/h2><p><span style=\"font-weight: 400;\">Your apps are the front door to your data. Use both static and dynamic checks, then follow up with a permissions review.<\/span><\/p><h3><b>1. Use Static Analysis Tools<\/b><\/h3><p><span style=\"font-weight: 400;\">Static analysis looks at an app without running it. For most users, the most straightforward route is using a security for your phone app that:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scans installed apps for known malware signatures.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Flags tampered with packages or apps from unknown sources.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Highlights dangerous permissions or risky SDKs.<\/span><\/li><\/ul><h3><b>2. Use Dynamic Analysis Tools<\/b><\/h3><p><span style=\"font-weight: 400;\">Dynamic analysis observes what an app does while it&#8217;s running:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Watch for unusual network activity.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor battery and data usage spikes that don&#8217;t match how you use the app.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use a security suite&#8217;s real-time protection to block and log suspicious behaviour.<\/span><\/li><\/ul><h3><b>3. Check App Permissions and Vulnerabilities<\/b><\/h3><p><span style=\"font-weight: 400;\">Review each app&#8217;s permissions and update to patch known flaws.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Open Settings \u2192 Privacy\/Permissions. Review critical permissions like SMS, Call logs, Camera, Microphone, and Location.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enable one-time permissions for the camera or location whenever possible.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Update every app from the Google Play Store. Updates often patch security holes.<\/span><\/li><\/ul><h2><b>Step 3: Analyse the Findings<\/b><\/h2><p><span style=\"font-weight: 400;\">After scanning and testing, you&#8217;ll have a list of alerts and warnings. Sort them so you act on the most critical items first.<\/span><\/p><h3><b>1. Identify Security Gaps<\/b><\/h3><p><span style=\"font-weight: 400;\">Common gaps include:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Old apps with known flaws.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sensitive permissions granted to apps that don&#8217;t need them.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sideloaded apps from unverified sources.<\/span><\/li><\/ul><h3><b>2. Prioritise Risks to Fix<\/b><\/h3><p><span style=\"font-weight: 400;\">Tackle issues in this order:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">High-risk apps flagged as malware or spyware should be uninstalled immediately.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Critical permissions misused by apps revoke or remove the app.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System updates install the latest Android and Play system updates.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Account risks change passwords, enable 2-step verification, and review recovery options.<\/span><\/li><\/ol><h2><b>Step 4: Strengthen Your Android Security<\/b><\/h2><p><span style=\"font-weight: 400;\">Once the gaps are closed, add stronger layers so your phone stays resilient.<\/span><\/p><h3><b>1. Enable Core Android Security Features<\/b><\/h3><p><span style=\"font-weight: 400;\">Features as follows:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Screen lock<\/b><span style=\"font-weight: 400;\">: Use a strong PIN and add fingerprint or face unlock for convenience.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Find My Device<\/b><span style=\"font-weight: 400;\">: Turn it on to locate, lock, or wipe your phone if it&#8217;s lost.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Secure Wi-Fi use<\/b><span style=\"font-weight: 400;\">: Prefer and <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.quickheal.co.in\/knowledge-centre\/4-rs-mobile-security-malicious-apps\/\">protect your mobile<\/a><\/span><span style=\"font-weight: 400;\"> network or known networks. Avoid sensitive work on open Wi-Fi.<\/span><\/li><\/ul><h3><b>2. Use Advanced Security Practices (MFA, Updates, Permissions)<\/b><\/h3><p><span style=\"font-weight: 400;\">Enable MFA, stay updated, and restrict app permissions to what\u2019s truly needed.<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Multi-factor authentication (MFA)<\/b><span style=\"font-weight: 400;\">: Turn it on for email, banking, UPI, and social media. It&#8217;s one of the best mobile app security best practices.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Permission hygiene<\/b><span style=\"font-weight: 400;\">: Review permissions monthly; remove anything that feels unnecessary.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Encrypted backups<\/b><span style=\"font-weight: 400;\">: Keep backups secure and test restore once in a while.<\/span><\/li><\/ul><h3><b>Add Quick Heal Protection for Extra Security<\/b><\/h3><p><span style=\"font-weight: 400;\">A trusted security suite adds web protection and routine health checks to support your Android audit. Explore options at Quick Heal. It can complement Android&#8217;s built-in defences and make routine upkeep easier for families. Mentioned thrice is plenty; choose what fits your needs and budget.<\/span><\/p><h2><b>Step 5: Maintain Ongoing Security<\/b><\/h2><p><span style=\"font-weight: 400;\">Security isn&#8217;t a one-time job. A light routine keeps your device clean and fast.<\/span><\/p><h3><b>Conduct Regular Security Checks<\/b><\/h3><p><span style=\"font-weight: 400;\">Pointers:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Weekly<\/b><span style=\"font-weight: 400;\">: Update apps and Android; run a quick scan.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Monthly<\/b><span style=\"font-weight: 400;\">: Review permissions and uninstall apps you don&#8217;t use.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Quarterly<\/b><span style=\"font-weight: 400;\">: Do a mini security audit using this same checklist.<\/span><\/li><\/ul><h3><b>Monitor for Threats<\/b><\/h3><p><span style=\"font-weight: 400;\">Pointers to look for:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keep an eye on battery drain and data usage spikes.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review bank SMS alerts and UPI notifications; report anything odd immediately to your bank.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Check login alerts from Google and social platforms. If you see unfamiliar devices, sign out everywhere and change your password.<\/span><\/li><\/ul><h3><b>Follow Mobile Security Best Practices<\/b><\/h3><p><span style=\"font-weight: 400;\">Here are a few <\/span><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.quickheal.co.in\/knowledge-centre\/essential-mobile-security-tips\/\">mobile security tips<\/a><\/span><span style=\"font-weight: 400;\"> to follow:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use strong, unique passwords and a reputable password manager.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t click unknown links in SMS, WhatsApp, or email.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lock sensitive apps with an extra PIN if your security app offers it.<\/span><\/li><\/ul><h2><b>When to Seek Professional Security Assistance<\/b><\/h2><p><span style=\"font-weight: 400;\">Most people can handle a routine Android security check. Still, there are times when expert help saves time and stress.<\/span><\/p><h3><b>Signs You Need Expert Help<\/b><\/h3><p><span style=\"font-weight: 400;\">Pointers to look:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You suspect spyware or see your camera\/mic activating randomly.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Banking or UPI transactions appear that you didn&#8217;t authorise.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The phone is part of office work and holds client data or confidential files.<\/span><\/li><\/ul><h3><b>Benefits of Professional Android Security Testing<\/b><\/h3><p><span style=\"font-weight: 400;\">Pointers to look:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Deep diagnostics<\/b><span style=\"font-weight: 400;\"> beyond consumer tools.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Forensic analysis<\/b><span style=\"font-weight: 400;\"> to find hidden threats and data exfiltration.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><b>Remediation plan<\/b><span style=\"font-weight: 400;\"> to harden settings for long-term safety.<\/span><\/li><\/ul><p>Documentation<span style=\"font-weight: 400;\"> for compliance or insurance, if needed.<\/span><\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29cb0d7 elementor-widget elementor-widget-mgz-section-title\" data-id=\"29cb0d7\" data-element_type=\"widget\" data-widget_type=\"mgz-section-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t    <h2 class=\"tx-section-heading mb-30\">\r\n        <span>frequently asked questions<\/span>\r\n    <\/h2>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11c8018 elementor-widget elementor-widget-mgz-faq-widget\" data-id=\"11c8018\" data-element_type=\"widget\" data-widget_type=\"mgz-faq-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\r\n    <div class=\"faq_wrap\">\r\n        <ul class=\"accordion_box clearfix\">\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    How to do a security check on an Android phone?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">Backup your information, keep Android and all apps up to date, perform a complete malware scan, turn on screen lock and run these checks repeatedly to keep your phone secure.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    How to audit a mobile app?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">First, perform a static scan to identify known problems, then utilise the live observational behaviour. Review every permission. If the app cannot provide a valid reason for obtaining access to sensitive information, deactivate the app or uninstall it.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    How can I run a security check on my Android phone?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">Obtain reputable <\/span><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\">security <\/a><a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security-for-android\">for android phones <\/a>applications for scanning, and be diligent in conducting application security permissions checks at least monthly.<\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What is the best security for your Android phone?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">Build your security habits by combining built-in Android options, coupled with a trusted security suite for Android phone users who request layered security. Consider tools that offer real-time protection and web filtering in conjunction with your Android phone audit.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                        <li class=\"accordion block\">\r\n                <div class=\"acc-btn\">\r\n                    What is the most powerful antivirus for Android?                <\/div>\r\n                <div class=\"acc_body \">\r\n                    <div class=\"content\">\r\n                        <p><p><span style=\"font-weight: 400\">\"Powerful\" is subjective based on your requirements of how a particular feature, like anti-theft, parental controls, fits within your daily factors or uses. You may want to start your audit by looking at the tools on the Quick Heal site and comparing plans.<\/span><\/p><\/p>\r\n                    <\/div>\r\n                <\/div>\r\n            <\/li>\r\n                    <\/ul>\r\n    <\/div>\r\n    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>From banking and shopping to pictures and work, we all depend on our phones for basically everything. It may seem technical, but a security audit is just what it sounds like: a health check for your device. This guide is a step-by-step guide to a full-blown audit you can do yourself at home. You&#8217;ll learn [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":9126,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-9069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/9069"}],"collection":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/comments?post=9069"}],"version-history":[{"count":40,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/9069\/revisions"}],"predecessor-version":[{"id":9129,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/posts\/9069\/revisions\/9129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media\/9126"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/media?parent=9069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/categories?post=9069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.co.in\/knowledge-centre\/wp-json\/wp\/v2\/tags?post=9069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}