{"id":1171,"date":"2016-05-31T09:11:21","date_gmt":"2016-05-31T13:11:21","guid":{"rendered":"https:\/\/tsisupport.com\/?p=1171"},"modified":"2021-08-09T06:05:19","modified_gmt":"2021-08-09T10:05:19","slug":"avoid-getting-hooked-this-phishing-season","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=1171","title":{"rendered":"What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked"},"content":{"rendered":"<p>Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It\u2019s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to demonstrate ways to identify and avoid putting you or your company\u2019s sensitive data at risk.<!--more--><\/p>\n<p>Although we\u2019ve discussed <a href=\"https:\/\/tsisupport.com\/tsistaging\/the-danger-of-phishing\/\">phishing<\/a> before; it is a topic that requires our attention as the campaigns continue to evolve and the implications for businesses and individuals become more profound.<\/p>\n<p><strong>Managing Sensitive Data:<\/strong><\/p>\n<p>An attack can start from someone within your organization unknowingly opening an attachment or link from what they believe to be a trusted source; including emails within the same organization, or a client they\u2019ve frequently corresponded with.\u00a0 These links or attachments have embedded code which can not only infect your network with <a href=\"https:\/\/tsisupport.com\/tsistaging\/tsi-security-warning\/\">ransomware<\/a>, but provide unauthorized access to someone from the outside. \u00a0In fact, according to Verizon, an astonishing 67% of cyber espionage begin with a phishing email.<\/p>\n<p>Take the recently publicized, <em>not to mention successful,<\/em> attack against the <a href=\"http:\/\/www.csoonline.com\/article\/3073458\/security\/milwaukee-bucks-hit-by-w-2-phishing-attack.html\">Milwaukee Bucks<\/a> when\u00a0 an email impersonating the team president Peter Feigin was sent requesting W-2s. \u00a0Naturally, an employee replied, attaching the 2015 tax records for all Bucks\u2019 employees, including athletes. It provided salaries, social security numbers, and addresses for anyone on payroll that year. This sensitive information is now in the hands of phishers, who are capable of tampering with the financial health of victims, from an assistant to one of their most widely recognized NBA stars, Jabari Parker.<\/p>\n<p><strong>Tips from the Experts:<\/strong><\/p>\n<p><strong><em>Never provide\u00a0personal or financial data in an email, do not respond to messages requesting this, especially if you are responsible for the safety\/integrity of others\u2019 information.<\/em><\/strong><\/p>\n<p>While you may take comfort in believing these attacks only occur at major organizations, think again.\u00a0 The <a href=\"https:\/\/www.irs.gov\/uac\/tax-scams-consumer-alerts\" target=\"_blank\" rel=\"noopener noreferrer\">IRS<\/a> recently released an alert reporting an approximate 400 percent surge in phishing and malware incidents so far this year.\u00a0 These attacks effect <a href=\"http:\/\/www.csoonline.com\/article\/3064214\/security\/thousands-of-taxpayers-affected-by-w-2-phishing-attacks-this-year.html\" target=\"_blank\" rel=\"noopener noreferrer\">individuals<\/a> as well as SMBS and are normally directed toward Human Resource or Accounting professionals in what appears from the President, CEO, or high ranking executive within the organization.<\/p>\n<h5>When in Doubt, Trust Your Gut:<\/h5>\n<p>There are two typical approaches used in phishing scams; either using an email address similar to someone you may know, or, when a phisher has gained access to the network and is using someone\u2019s email credentials to impersonate them outright.<\/p>\n<p>It\u2019s why, when opening any message, to practice caution and be aware of today\u2019s phishing techniques.\u00a0 Take a recent scam targeting a <a href=\"http:\/\/www.csoonline.com\/article\/3071687\/security\/basic-phishing-scam-successfully-targets-pr-agency-reporters.html\" target=\"_blank\" rel=\"noopener noreferrer\">PR agency<\/a>.<\/p>\n<p>A journalist received an email from a known contact who they had worked with in the past. However, being the sleuth she was, the journalist identified a few key inconsistencies between this message and others she had received in the past.\u00a0 For instance, the subject line was omitted, the message body was generic and requested she click on a link which appeared to be a Dropbox page, when in fact it was a harvesting page that captured email credentials.<\/p>\n<p>Thanks to the journalist\u2019s suspicions, she was able to prevent the phishing scam from spreading through her network.\u00a0 Unfortunately, the same could not be said for the sender who was already aware of two internal employees that fell for the scam, giving full access to the phishers.<\/p>\n<p><strong>Tips from the Experts:<\/strong><\/p>\n<p><em>Trust your gut.\u00a0 If the message appears odd, don\u2019t open it.\u00a0 Contact your IT department and delete it.<\/em><\/p>\n<p><strong>Identifying a Phishing Attack:<\/strong><\/p>\n<p><em><strong>Below are a few different types of phishing scams and ways to protect yourself:<\/strong><\/em><\/p>\n<p>&#8211; Pharming: Is a scheme where hackers tamper with the company\u2019s host files or domain so that web visitors are redirected to a fake site; often resulting in customers entering confidential information or making purchases on a site that is controlled by the phishers who capture the data. While shopping or entering your private information online, check that the URL of the site is authentic and look for the secure certificate.<\/p>\n<p>&#8211; Executive Fraud: A style highlighted in this article where phishers use a similar email address of a decision maker to request data or payments from others within the company. This style of attack primarily directs itself toward human resources for data, or accounting to process a funds transfer.\u00a0 The easiest way to avoid it would be by confirming with the sender in person before processing any type of transfer request made via email.<\/p>\n<p>&#8211; Deceptive Phishing: Emails portrayed as a recognized source requesting you to verify your account, re-enter information, or make a payment.\u00a0 This method is commonly used to collect details to access your bank account.\u00a0 These can be identified by generic greetings or a request for information that the source should already have on file.<\/p>\n<p>&#8211; Google Docs \/ Dropbox Phishing: Also discussed in this article, is a tactic used through sending a realistic email with a secure click-through for recipients to download a shared document or enter their credentials. The objective with fraudulent Dropbox attacks is to install malware onto your computer.\u00a0 While the Google Docs style approach requests account credential verification on a site that appears authentic, the reality is that it is owned by the phisher<\/p>\n<p><span style=\"color: #800000;\"><strong>Tips from the Experts:<\/strong><\/span><\/p>\n<p><strong><em>Remember to question emails requesting action, check that validity of links before clicking on them, never provide banking details or credentials via email, and finally, report suspicious emails to your IT department and notify the real sender.<\/em><\/strong><\/p>\n<p><span style=\"color: #800000;\"><strong>Solutions:<\/strong><\/span><\/p>\n<p>Aside from today\u2019s advanced phishing techniques, the most overlooked security risk to data and information breaches is the human factor.\u00a0 TSI offers proactive tools to combat phishing attacks by providing real-world phishing simulations to test your staff and identify areas for improvement.\u00a0 However the most important service we provide to prevent future phishing outbreaks is education. We complement our security tools by providing employee training to minimize the opportunities for a successful attack or breach.\u00a0 To learn more on how our simulation phishing security tests &amp; educational trainings can benefit your organization, <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">contact us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Phishing season is in full swing, with a more sophisticated and increasingly deceptive hacking methodology that can hook even the savviest of us into providing confidential information. It\u2019s why we found it fitting to round up a few examples of the most common and prevalent attacks we have faced this year. We also wanted to&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8416,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[171,222,211,173,223,224,129,132,225,169,170],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI<\/title>\n<meta name=\"description\" content=\"Protect your company&#039;s private data by starting your anti-phishing education with TSI&#039;s roundup of common phishing methods. Learn how to protect your data.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI\" \/>\n<meta property=\"og:description\" content=\"Protect your company&#039;s private data by starting your anti-phishing education with TSI&#039;s roundup of common phishing methods. Learn how to protect your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=1171\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-31T13:11:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T10:05:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171\",\"name\":\"What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png\",\"datePublished\":\"2016-05-31T13:11:21+00:00\",\"dateModified\":\"2021-08-09T10:05:19+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Protect your company's private data by starting your anti-phishing education with TSI's roundup of common phishing methods. Learn how to protect your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=1171\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=1171#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI","description":"Protect your company's private data by starting your anti-phishing education with TSI's roundup of common phishing methods. Learn how to protect your data.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI","og_description":"Protect your company's private data by starting your anti-phishing education with TSI's roundup of common phishing methods. Learn how to protect your data.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=1171","og_site_name":"TSI Support","article_published_time":"2016-05-31T13:11:21+00:00","article_modified_time":"2021-08-09T10:05:19+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171","url":"https:\/\/tsisupport.com\/tsistaging\/?p=1171","name":"What Is a Common Indicator of a Phishing Attempt? | Anti-Phishing | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png","datePublished":"2016-05-31T13:11:21+00:00","dateModified":"2021-08-09T10:05:19+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Protect your company's private data by starting your anti-phishing education with TSI's roundup of common phishing methods. Learn how to protect your data.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=1171"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2016\/05\/Avoid-Getting-Hooked-This-Phishing-Season-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=1171#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"What Is a Common Indicator of a Phishing Attempt and How to Avoid Getting Hooked"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1171"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1171"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/1171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8416"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}