{"id":79271,"date":"2017-09-27T06:00:26","date_gmt":"2017-09-27T13:00:26","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=79271"},"modified":"2025-08-31T19:39:13","modified_gmt":"2025-09-01T02:39:13","slug":"mobile-phishing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/","title":{"rendered":"Catch Phish If You Can"},"content":{"rendered":"<p>There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con artist, Frank Abagnale. Abagnale, portrayed by Leonardo DiCaprio, poses as a variety of professions (a pilot, a doctor, and a lawyer) as he forges checks all around world and steals millions of dollars. His attention to detail and ability to charm people are key elements of his schemes, which, as a security expert, reminded me a lot about <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/common-phishing-scams\/\" target=\"_blank\" rel=\"noopener\">phishing scams<\/a>.<\/p>\n<p>Frank convinced banks to give him money through fake checks, but hackers convince you to give up your information through fake emails and URLs. These emails and URLs are nearly identical to emails you might receive from your bank or insurance carriers and often ask you to \u201cconfirm\u201d your sensitive information.<\/p>\n<p>Phishing scams also utilize <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/social-engineering\" target=\"_blank\" rel=\"noopener\">social engineering<\/a>, a technique DiCaprio\u2019s character used perfectly to his advantage throughout the film. Time and again, Abagnale uses his ability to charm people into trusting him in order to get what he wants; a bank account, a pilot\u2019s uniform, and even a fianc\u00e9e. Cybercriminals do the exact same &#8212; they rely on people\u2019s trusting demeanors in order to get what they want, which in their case is their victim\u2019s personal information.<\/p>\n<p>While there are many comparisons between Frank\u2019s conning tactics and today\u2019s scams, it\u2019s important to remember that the resources and attacks vectors available to today\u2019s criminals have expanded. Even though Frank was successful, he was still limited compared to today\u2019s tech advancements. Digitization has opened new doors for hackers, especially when it comes to mobile devices. In fact, it\u2019s been reported that mobile devices users, specifically iOS devices, are the <a href=\"http:\/\/www.techrepublic.com\/article\/ios-users-beware-youre-the-biggest-target-for-mobile-phishing-attacks\/\" target=\"_blank\" rel=\"noopener\">biggest target<\/a> for mobile phishing attacks.<\/p>\n<h2>How to Catch Social Engineering Attacks<\/h2>\n<p>So how can you catch these attempts to steal your information? We\u2019re glad you asked.<\/p>\n<ul>\n<li><strong>How much is too much?<\/strong> If you\u2019re being asked for too much information, be cautious.<\/li>\n<li><strong>Address unknown:<\/strong> Before logging into an account, make sure it has the correct web address.<\/li>\n<li><strong>What\u2019s in a name:<\/strong> Do you recognize the sender\u2019s name and email address? Does the company\u2019s email match others you\u2019ve received? Check these before responding!<\/li>\n<li><strong>It\u2019s ok to hover:<\/strong> Before you click that link, hover over it to see if the URL address looks legitimate.<\/li>\n<li><strong>Is it too good to be true? <\/strong>\u201cFree\u201d offers, or deals that sound out of this world probably are. Avoid these like the plague.<\/li>\n<li><strong>Security is key<\/strong>: Always use comprehensive\u00a0<a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/index.html\" target=\"_blank\" rel=\"noopener\">security software<\/a>\u00a0to protect your devices and personal data from malware and other threats that might result from a phishing scam.<\/li>\n<\/ul>\n<p>Remember, as great as movies are for entertainment, reality is much more serious. Always be cautious and protective when it comes to your personal information. Keep up to date on best practices and latest security updates.<\/p>\n<p>Interested in learning more about mobile security tips and trends? Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and like us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\/\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven&#8230;<\/p>\n","protected":false},"author":674,"featured_media":160628,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[214,4185],"coauthors":[3973],"class_list":["post-79271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-mobile-security1","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Catch Phish If You Can | McAfee Blog<\/title>\n<meta name=\"description\" content=\"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catch Phish If You Can | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-27T13:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T02:39:13+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Catch Phish If You Can\",\"datePublished\":\"2017-09-27T13:00:26+00:00\",\"dateModified\":\"2025-09-01T02:39:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\"},\"wordCount\":520,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png\",\"keywords\":[\"mobile security\",\"Phishing\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\",\"name\":\"Catch Phish If You Can | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png\",\"datePublished\":\"2017-09-27T13:00:26+00:00\",\"dateModified\":\"2025-09-01T02:39:13+00:00\",\"description\":\"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png\",\"width\":614,\"height\":300,\"caption\":\"man checking his laptop for phishing attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Catch Phish If You Can\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Catch Phish If You Can | McAfee Blog","description":"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Catch Phish If You Can | McAfee Blog","og_description":"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-09-27T13:00:26+00:00","article_modified_time":"2025-09-01T02:39:13+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Catch Phish If You Can","datePublished":"2017-09-27T13:00:26+00:00","dateModified":"2025-09-01T02:39:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/"},"wordCount":520,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png","keywords":["mobile security","Phishing"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/","name":"Catch Phish If You Can | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png","datePublished":"2017-09-27T13:00:26+00:00","dateModified":"2025-09-01T02:39:13+00:00","description":"There are some movies you can watch over and over again. For me, it\u2019s \u201cCatch Me If You Can,\u201d Steven Spielberg\u2019s 2002 crime film based on the life of con","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/614x300_Staying-safer-online-from-phishing-and-other-attacks.png","width":614,"height":300,"caption":"man checking his laptop for phishing attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Catch Phish If You Can"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=79271"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79271\/revisions"}],"predecessor-version":[{"id":221786,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79271\/revisions\/221786"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/160628"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=79271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=79271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=79271"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=79271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}