{"id":29969,"date":"2016-11-24T19:00:21","date_gmt":"2016-11-24T17:00:21","guid":{"rendered":"https:\/\/www.giztab.com\/?p=29969"},"modified":"2016-11-27T06:43:30","modified_gmt":"2016-11-27T04:43:30","slug":"auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte","status":"publish","type":"post","link":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/","title":{"rendered":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte"},"content":{"rendered":"

\"banner_kaspersky\"<\/a><\/p>\n

Parece una historia de Hollywood, pero es cierto. Investigadores de la Universidad Ben Gurion en Israel consiguieron convertir auriculares sencillos en micr\u00f3fonos para espiar, algo que pueden realizar incluso a distancia, con este procedimiento se puede escuchar de forma inal\u00e1mbrica todo lo que se dice.<\/p>\n

El proyecto lleva por nombre \u00abSpeake(a)r\u00bb,<\/strong> y aunque no tiene fines de espionaje real, ciertamente son una alarma para hacer que la comunidad en general y los responsables de seguridad puedan ver que si un hacker tiene la intenci\u00f3n, puede emplear un malware que invierta la polaridad de un auricular para convertirlo en micr\u00f3fono.<\/p>\n


\n

 <\/p>\n

Un nuevo malware Android ataca los m\u00f3viles con procesador Qualcomm<\/a><\/span><\/h2>\n
\n

No es ning\u00fan hallazgo cient\u00edfico utilizar auriculares para grabar sonido coloc\u00e1ndolo en el puerto correcto del ordenador, dice FayerWayer,<\/a> pero la novedad est\u00e1 que esa acci\u00f3n pueda realizarse de forma remota, es decir una nueva metodolog\u00eda ciberataque.<\/p>\n

La vulnerabilidad se detecto en un chip RealTek en el que luego de desactivar f\u00edsicamente el micr\u00f3fono, igual podr\u00eda funcionar el malware ya que requiere \u00fanicamente un puerto de salida de sonido.<\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.<\/p>\n","protected":false},"author":31,"featured_media":9806,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[5346,267],"yoast_head":"\nAuriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte - GizTab<\/title>\n<meta name=\"description\" content=\"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte\" \/>\n<meta property=\"og:description\" content=\"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\" \/>\n<meta property=\"og:site_name\" content=\"GizTab\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Giztab\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-24T17:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-27T04:43:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/www.www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg?fit=660%2C440&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"H. Tech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@giz_tab\" \/>\n<meta name=\"twitter:site\" content=\"@giz_tab\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"H. Tech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\"},\"author\":{\"name\":\"H. Tech\",\"@id\":\"https:\/\/www.giztab.com\/#\/schema\/person\/caf0e42ac9f684165a4e63188a86bf10\"},\"headline\":\"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte\",\"datePublished\":\"2016-11-24T17:00:21+00:00\",\"dateModified\":\"2016-11-27T04:43:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\"},\"wordCount\":208,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.giztab.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg\",\"keywords\":[\"ataques IoT\",\"malware\"],\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\",\"url\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\",\"name\":\"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte - GizTab\",\"isPartOf\":{\"@id\":\"https:\/\/www.giztab.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg\",\"datePublished\":\"2016-11-24T17:00:21+00:00\",\"dateModified\":\"2016-11-27T04:43:30+00:00\",\"description\":\"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage\",\"url\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg\",\"contentUrl\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg\",\"width\":660,\"height\":440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.giztab.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.giztab.com\/#website\",\"url\":\"https:\/\/www.giztab.com\/\",\"name\":\"GizTab\",\"description\":\"Tecnolog\u00eda, m\u00f3viles, gadgets, tendencias y m\u00e1s\",\"publisher\":{\"@id\":\"https:\/\/www.giztab.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.giztab.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.giztab.com\/#organization\",\"name\":\"Giztab\",\"url\":\"https:\/\/www.giztab.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.giztab.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2014\/01\/logo_230.png\",\"contentUrl\":\"https:\/\/www.giztab.com\/wp-content\/uploads\/2014\/01\/logo_230.png\",\"width\":230,\"height\":76,\"caption\":\"Giztab\"},\"image\":{\"@id\":\"https:\/\/www.giztab.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Giztab\",\"https:\/\/x.com\/giz_tab\",\"https:\/\/www.instagram.com\/giz_tab\/\",\"https:\/\/www.youtube.com\/channel\/UCyrQ0l-02EjcdicS_RBgYKw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.giztab.com\/#\/schema\/person\/caf0e42ac9f684165a4e63188a86bf10\",\"name\":\"H. Tech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.giztab.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5f45c79f8294237ed3f7441432e2267?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5f45c79f8294237ed3f7441432e2267?s=96&r=g\",\"caption\":\"H. Tech\"},\"description\":\"Periodista, amante de las redes sociales y de la tecnolog\u00eda, dad\u00b4s since 2015.\",\"url\":\"https:\/\/www.giztab.com\/author\/henrypinto\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte - GizTab","description":"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/","og_locale":"es_ES","og_type":"article","og_title":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte","og_description":"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.","og_url":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/","og_site_name":"GizTab","article_publisher":"https:\/\/www.facebook.com\/Giztab","article_published_time":"2016-11-24T17:00:21+00:00","article_modified_time":"2016-11-27T04:43:30+00:00","og_image":[{"width":660,"height":440,"url":"https:\/\/i2.wp.com\/www.www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg?fit=660%2C440&ssl=1","type":"image\/jpeg"}],"author":"H. Tech","twitter_card":"summary_large_image","twitter_creator":"@giz_tab","twitter_site":"@giz_tab","twitter_misc":{"Escrito por":"H. Tech","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#article","isPartOf":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/"},"author":{"name":"H. Tech","@id":"https:\/\/www.giztab.com\/#\/schema\/person\/caf0e42ac9f684165a4e63188a86bf10"},"headline":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte","datePublished":"2016-11-24T17:00:21+00:00","dateModified":"2016-11-27T04:43:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/"},"wordCount":208,"commentCount":0,"publisher":{"@id":"https:\/\/www.giztab.com\/#organization"},"image":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg","keywords":["ataques IoT","malware"],"articleSection":["Seguridad"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/","url":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/","name":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte - GizTab","isPartOf":{"@id":"https:\/\/www.giztab.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage"},"image":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage"},"thumbnailUrl":"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg","datePublished":"2016-11-24T17:00:21+00:00","dateModified":"2016-11-27T04:43:30+00:00","description":"La vulnerabilidad se detecto en un chip RealTek, en el que podr\u00eda ejecutarse el malware ya que requiere \u00fanicamente un puerto de salida de sonido.","breadcrumb":{"@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#primaryimage","url":"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg","contentUrl":"https:\/\/www.giztab.com\/wp-content\/uploads\/2015\/02\/Tdk-auriculares-cascos-SB30-SB40s-SIE20-precio.jpg","width":660,"height":440},{"@type":"BreadcrumbList","@id":"https:\/\/www.giztab.com\/auriculares-infectados-malware-se-convierten-microfonos-sirven-espiarte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.giztab.com\/"},{"@type":"ListItem","position":2,"name":"Auriculares infectados con malware se convierten en micr\u00f3fonos y sirven para espiarte"}]},{"@type":"WebSite","@id":"https:\/\/www.giztab.com\/#website","url":"https:\/\/www.giztab.com\/","name":"GizTab","description":"Tecnolog\u00eda, m\u00f3viles, gadgets, tendencias y m\u00e1s","publisher":{"@id":"https:\/\/www.giztab.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.giztab.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.giztab.com\/#organization","name":"Giztab","url":"https:\/\/www.giztab.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.giztab.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.giztab.com\/wp-content\/uploads\/2014\/01\/logo_230.png","contentUrl":"https:\/\/www.giztab.com\/wp-content\/uploads\/2014\/01\/logo_230.png","width":230,"height":76,"caption":"Giztab"},"image":{"@id":"https:\/\/www.giztab.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Giztab","https:\/\/x.com\/giz_tab","https:\/\/www.instagram.com\/giz_tab\/","https:\/\/www.youtube.com\/channel\/UCyrQ0l-02EjcdicS_RBgYKw"]},{"@type":"Person","@id":"https:\/\/www.giztab.com\/#\/schema\/person\/caf0e42ac9f684165a4e63188a86bf10","name":"H. Tech","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.giztab.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5f45c79f8294237ed3f7441432e2267?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5f45c79f8294237ed3f7441432e2267?s=96&r=g","caption":"H. Tech"},"description":"Periodista, amante de las redes sociales y de la tecnolog\u00eda, dad\u00b4s since 2015.","url":"https:\/\/www.giztab.com\/author\/henrypinto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/posts\/29969"}],"collection":[{"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/comments?post=29969"}],"version-history":[{"count":2,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/posts\/29969\/revisions"}],"predecessor-version":[{"id":29971,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/posts\/29969\/revisions\/29971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/media\/9806"}],"wp:attachment":[{"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/media?parent=29969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/categories?post=29969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.giztab.com\/wp-json\/wp\/v2\/tags?post=29969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}