{"id":1485,"date":"2020-06-10T23:28:26","date_gmt":"2020-06-10T17:58:26","guid":{"rendered":"https:\/\/www.wikitechupdates.com\/?p=1485"},"modified":"2020-06-10T23:28:26","modified_gmt":"2020-06-10T17:58:26","slug":"how-to-detect-fraudulent-emails","status":"publish","type":"post","link":"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/","title":{"rendered":"How to detect fraudulent emails"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655de83927dcd\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655de83927dcd\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#Learn_how_to_detect_fraudulent_email_and_take_steps_to_protect_yourself\" title=\"Learn how to detect fraudulent email and take steps to protect yourself\">Learn how to detect fraudulent email and take steps to protect yourself<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#What_are_email_scams\" title=\"What are email scams?\">What are email scams?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#How_do_fraudulent_emails_work\" title=\"How do fraudulent emails work?\">How do fraudulent emails work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#How_do_email_scammers_find_victims\" title=\"How do email scammers find victims?\">How do email scammers find victims?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#How_do_I_avoid_getting_involved_in_email_scams\" title=\"How do I avoid getting involved in email scams?\">How do I avoid getting involved in email scams?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#Im_already_a_victim_What_should_I_do\" title=\"I&#8217;m already a victim. What should I do?\">I&#8217;m already a victim. What should I do?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.wikitechupdates.com\/how-to-detect-fraudulent-emails\/#How_do_I_avoid_being_the_target_of_email_scams\" title=\"How do I avoid being the target of email scams?\">How do I avoid being the target of email scams?<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Learn_how_to_detect_fraudulent_email_and_take_steps_to_protect_yourself\"><\/span>Learn how to detect fraudulent email and take steps to protect yourself<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email scams have been around for years, and phishing is a type of email scam. Between 2010 and 2014 alone, phishing incidents increased by more than 160%, costing companies around the world billions of dollars and affecting more than half of internet users. Learn how to spot fraudulent emails and phishing scams and protect yourself.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_email_scams\"><\/span>What are email scams?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email scams are any scam that uses email as its primary vector. The most common <strong>email scam<\/strong> is the <strong>phishing scam<\/strong>, followed by the<strong> spoofing scam<\/strong>.<\/p>\n<p>Phishing is a type of scam in which the scammer tries to obtain confidential information from potential victims.<\/p>\n<p>Phishing involves making it appear that an email is coming from a legitimate source. Most often the two are used together to craft elaborate scams.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_fraudulent_emails_work\"><\/span>How do fraudulent emails work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>These <strong>scams first find their way into your inbox and appear to come from a legitimate source<\/strong>. They often occur in the form of messages about some great opportunity that you need to take advantage of immediately or some kind of emergency or problem that you need to handle and resolve.<\/p>\n<p>There is almost always a sense of urgency that is designed to motivate you to act immediately without thinking. Scammers know that the more time passes before you take action, the longer you will think and the easier it will be for you to spot inconsistencies in the email and be suspicious.<\/p>\n<p>The idea is for you to act with a sense of urgency, and it usually involves clicking on some type of link that will take you to the scammer&#8217;s website, where you will be asked to log into your account or take some other action designed to obtain your personal data.<\/p>\n<p>Sometimes, <strong>just clicking on the link will download malware to your computer<\/strong>, where it will <strong>wreak havoc<\/strong>. The same is true if the <strong>email includes some type of attachment<\/strong>, which is usually <strong>malware<\/strong> that is inadvertently downloaded to your computer when the attachment is opened.<\/p>\n<p>However, once you provide your personal information, such as your phone number, social security number, bank account number or PIN, it will be used by the scammer for fraudulent purposes.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_email_scammers_find_victims\"><\/span>How do email scammers find victims?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email scammers often buy wholesale email addresses on the <strong>dark web<\/strong>. As long as you hear about a massive data breach affecting big business, compromised emails are <strong>likely to be sold on the black market<\/strong>.<\/p>\n<p>In other cases, scammers find your email through a trial and error process in which they try many different possible names. Whichever method is used, it is almost guaranteed that you will receive at least one email from a scammer in your entire life. More than half of the Internet receives at least one phishing email every day.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_avoid_getting_involved_in_email_scams\"><\/span>How do I avoid getting involved in email scams?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Your most excellent defence is to cultivate the ability to detect these emails. Here are some useful things to keep in mind that will tell you if you are dealing with a<strong> fraudulent email<\/strong>.<\/p>\n<ul>\n<li><strong>The domain is public<\/strong>. Unless you are dealing with an individual worker, most official emails from organizations end up in the company domain. Google, for example, uses &#8220;@ google.com&#8221;, while most universities use &#8220;@ university.edu&#8221;, where &#8220;university&#8221; is usually the name or abbreviation of the university. If the email address ends In a public domain, chances are you&#8217;re dealing with a scammer.<\/li>\n<li><strong>They forged the display name<\/strong>. Before opening the email, the display name and the &#8220;From:&#8221; field may include the Google name. However, if you look at the email address, you will see that the email has nothing to do with Google. Spoofing a display name is easy enough by email, as scammers choose which display name, even when the email address is false. Most people also trust the display names, believing that they come from a legitimate source without actually checking the email address.<\/li>\n<li><strong>A misspelt domain name<\/strong>. Sometimes the domain name may seem legitimate at first glance. It may look like @ microsoft.com from afar, but it&#8217;s better to look closely. For example, <strong>microsoft.com<\/strong> may be <strong>falsified as &#8220;mircosoft.com&#8221;<\/strong> or <strong>&#8220;micosoft.com&#8221;<\/strong> or some other variation. They look like a lot, but two are bogus. When you check a sender&#8217;s email address, even if it looks legitimate, be sure to check it carefully to see if it finds any misspelling in the domain name.<\/li>\n<li><strong>The email is full of grammatical errors<\/strong>. A legitimate company email will often be checked and corrected to ensure it is grammatically correct and free of typos. Most scam emails are full of typos and grammatical errors. When you see a suspicious email, <strong>pay less attention to typos and more attention to grammatical errors<\/strong>. Even native speakers make typographical errors. Many of the grammatical errors found in fraudulent emails are of a nature that only a non-native speaker could make. They are apparent and will give you that feeling of suspicion that tells you something is wrong.<\/li>\n<li><strong>How many receivers are there?<\/strong> Usually, when scammers send their emails, it is an automated process. They get a large number of addresses and send a massive message to all of them. You may find that the &#8220;To:&#8221; field in the email has your address, as well as many others. That should <strong>immediately raise a red flag<\/strong>. When a legitimate company wants to send you a personal email, it doesn&#8217;t label a bunch of other addresses in the email. It is typically for your eyes only.<\/li>\n<li><strong>Suspicious links and attachments<\/strong>. Many fraudulent emails contain suspicious attachments and links. Never open the attachments of such emails because they most likely <strong>contain malware that can infect your computer<\/strong>. If you want to check if the attachment comes from the right source or not, just contact the sender in some other way, like by phone or instant messaging, and ask them about it. <strong>Please do not open the attachment<\/strong>, and <strong>sometimes the links are hidden behind a button in the email<\/strong>. In that case, hover your mouse over the link and <strong>look at the URL that appears in the lower-left corner of your browser<\/strong>. <strong>If the<\/strong> <strong>URL looks suspicious, don&#8217;t click on it<\/strong>. Instead, contact the sender through some other method and ask them about the legitimacy of the link.<\/li>\n<li><strong>Sense of urgency<\/strong>: Often, the message will attempt to invoke a sense of urgency. They will tell you that your account has been compromised and that you need to do something immediately to save it, or that you are the winner of a lottery that you do not remember registering and that you need to act quickly to collect your reward. When you see this, you should know that you are <strong>dealing with a scam<\/strong>.<\/li>\n<\/ul>\n<p>Criminals will do anything to make you act naive, including creating a false sense of urgency to act without thinking.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Im_already_a_victim_What_should_I_do\"><\/span>I&#8217;m already a victim. What should I do?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If you have already been scammed and it happened on a computer at work, report the incident to your IT department or your boss. If it&#8217;s on your home computer, report it immediately online.<\/p>\n<p>You should also take immediate steps to protect compromised accounts, such as changing your password or alerting Google, your bank, or any platform on which you have opened the account. If your credit card details have been stolen, contact your bank and ask them to freeze your credit card immediately.<\/p>\n<p>Ultimately, you should share these scams with others by reporting them so they can be further investigated and prevented in the future. But your most significant defence by far is knowing how to spot them in the first place.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_I_avoid_being_the_target_of_email_scams\"><\/span>How do I avoid being the target of email scams?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Unfortunately, just having an email address makes you a target. Change your password regularly and make it more secure. <strong>Strong passwords have upper and lower case letters, at least one number, and at least one symbol.<\/strong><\/p>\n<p>When you are aware of scams that exist, you are more likely to recognize and report them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to detect fraudulent email and take steps to protect yourself Email scams have<\/p>\n","protected":false},"author":1,"featured_media":1486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[452],"tags":[961,962,958,960,959,963],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/06\/How-to-detect-fraudulent-emails.jpg?fit=1000%2C500&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":2430,"url":"https:\/\/www.wikitechupdates.com\/protect-your-information-online\/","url_meta":{"origin":1485,"position":0},"title":"How to protect your information online","author":"Admin","date":"6 February 2022","format":false,"excerpt":"As technology advances, more of our personal information is being stored online. This can include everything from our addresses and phone numbers to our bank account details. While this makes life easier in some ways, it also leaves us open to attack if our information falls into the wrong hands.\u2026","rel":"","context":"In &quot;Latest Updates&quot;","block_context":{"text":"Latest Updates","link":"https:\/\/www.wikitechupdates.com\/category\/latest-updates\/"},"img":{"alt_text":"How to protect your information online","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/02\/How-to-protect-your-information-online.jpg?fit=1200%2C661&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2965,"url":"https:\/\/www.wikitechupdates.com\/2cc-manga\/","url_meta":{"origin":1485,"position":1},"title":"What is &#8220;2CC Manga&#8221;? How to read manga for free","author":"Admin","date":"26 July 2023","format":false,"excerpt":"2CC Manga\" is an illegal website where you can download manga for free. This article explains in detail how to use \"manga zip\". I can't watch \"2cc cartoon\", has it closed? I would like to know about alternatives or successors of \"2CC Manga\". I wrote this article for those people.\u2026","rel":"","context":"In &quot;Entertainment&quot;","block_context":{"text":"Entertainment","link":"https:\/\/www.wikitechupdates.com\/category\/entertainment\/"},"img":{"alt_text":"2CC Manga","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/2CC-Manga.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/2CC-Manga.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/2CC-Manga.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/2CC-Manga.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/2CC-Manga.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":2020,"url":"https:\/\/www.wikitechupdates.com\/simple-tips-to-protect-your-gmail-account\/","url_meta":{"origin":1485,"position":2},"title":"Simple Tips to Protect Your Gmail Account","author":"Admin","date":"24 February 2021","format":false,"excerpt":"Mail stores a lot of personal information, including bank payments, business correspondence, information about recent bonuses received at\u00a0PlayAmo Casino App\u00a0and more. If a scammer hacks it, he can easily log in to most sites and even apply for an online loan.\u00a0 Use a Complex Password\u00a0 This is a trivial, but\u2026","rel":"","context":"In &quot;Latest Updates&quot;","block_context":{"text":"Latest Updates","link":"https:\/\/www.wikitechupdates.com\/category\/latest-updates\/"},"img":{"alt_text":"Simple Tips to Protect Your Gmail Account","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2021\/02\/Simple-Tips-to-Protect-Your-Gmail-Account-e1614179121666.jpg?fit=1137%2C595&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1006,"url":"https:\/\/www.wikitechupdates.com\/free-and-paid-antivirus-for-all-devices\/","url_meta":{"origin":1485,"position":3},"title":"Best Free and Paid Antivirus for all Devices in 2020","author":"Admin","date":"5 May 2020","format":false,"excerpt":"The growth of computer systems and technology has been immense, and thanks to this, a large number of programs have emerged that simplify the day-to-day development of its users. However, despite the notable efforts made by law enforcement agencies and software developers, viruses continue to linger on them. In this\u2026","rel":"","context":"In &quot;Business&quot;","block_context":{"text":"Business","link":"https:\/\/www.wikitechupdates.com\/category\/business\/"},"img":{"alt_text":"antivirus","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/antivirus.jpg?fit=612%2C408&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/antivirus.jpg?fit=612%2C408&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2020\/05\/antivirus.jpg?fit=612%2C408&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2572,"url":"https:\/\/www.wikitechupdates.com\/common-ways-ransomware-spreads\/","url_meta":{"origin":1485,"position":4},"title":"5 Common Ways Ransomware Spreads","author":"Admin","date":"14 May 2022","format":false,"excerpt":"Ransomware is becoming the most dangerous threat by cybercriminals trying their luck for easy money. Ransomware attacks directly target victims by encrypting their computer files and holding them for ransom.\u00a0 The idea is that you must pay, or else your network will forever be held hostage. Although you cannot protect\u2026","rel":"","context":"In &quot;Latest Updates&quot;","block_context":{"text":"Latest Updates","link":"https:\/\/www.wikitechupdates.com\/category\/latest-updates\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2022\/05\/A957684E-BF42-4267-B4D1-9C03EA1CE79D.jpeg?fit=701%2C438&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2960,"url":"https:\/\/www.wikitechupdates.com\/xbooks-alternatives\/","url_meta":{"origin":1485,"position":5},"title":"Xbooks is Shutting Down! Shocking Reasons and 21 Alternative Sites!","author":"Tejaswini","date":"26 July 2023","format":false,"excerpt":"Xbooks\" is a Doujin Erotic Manga pirate site available for free. However, it is now closed and inaccessible. This article summarizes the circumstances behind the closure of Xbooks and alternative sites Xbooks\" is a free available Doujin Erotic Manga pirate site\u00a0. However it is\u00a0now closed\u00a0and inaccessible. This article summarizes the\u2026","rel":"","context":"In &quot;Entertainment&quot;","block_context":{"text":"Entertainment","link":"https:\/\/www.wikitechupdates.com\/category\/entertainment\/"},"img":{"alt_text":"Xbooks is Shutting Down","src":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/Xbooks-is-Shutting-Down.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/Xbooks-is-Shutting-Down.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/Xbooks-is-Shutting-Down.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/Xbooks-is-Shutting-Down.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.wikitechupdates.com\/wp-content\/uploads\/2023\/07\/Xbooks-is-Shutting-Down.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/1485"}],"collection":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/comments?post=1485"}],"version-history":[{"count":1,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/1485\/revisions"}],"predecessor-version":[{"id":1487,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/posts\/1485\/revisions\/1487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media\/1486"}],"wp:attachment":[{"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/media?parent=1485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/categories?post=1485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wikitechupdates.com\/wp-json\/wp\/v2\/tags?post=1485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}