{"id":84,"date":"2008-01-20T15:48:00","date_gmt":"2008-01-20T15:48:00","guid":{"rendered":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html"},"modified":"2019-09-13T12:25:49","modified_gmt":"2019-09-13T12:25:49","slug":"13-ways-the-pdf-is-vulnerable","status":"publish","type":"post","link":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html","title":{"rendered":"13 Ways The PDF Is Vulnerable"},"content":{"rendered":"<p><span lang=\"EN-CA\"> <img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-7570 size-full\" src=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\" alt=\"PDF Logo\" width=\"234\" height=\"291\" \/>What makes the PDF so enticing to malicious users? There are more reasons than you think. <\/span><\/p>\n<p><span lang=\"EN-CA\">With the recent headlines about Adobe PDF vulnerabilities being taken advantage of, just about anyone who used a PC was on the alert. PDF files have the potential to do some serious damage to systems and data when infected. <\/span><\/p>\n<p>Because the PDF is not without its weaknesses, anticipating ways in which attackers can use the format can be the best way to defend against it.<\/p>\n<p><span lang=\"EN-CA\">Below is a brief look at 13 ways\u2014both technical and simple, in which the PDF is vulnerable and can be manipulated by malicious users.<\/span><\/p>\n<p><span lang=\"EN-CA\">1) <\/span><strong><span lang=\"EN-CA\">JavaScript<\/span><\/strong><\/p>\n<p>Online PDFs are designated with open parameters that can be injected with malicious JavaScript code. Because of the flexibility of JavaScript, hackers have a broad range of what can be done using the PDF file as their hacking tool of choice.<\/p>\n<p><span lang=\"EN-CA\">2) <\/span><strong><span lang=\"EN-CA\">Spam<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">The recent spamming attacks this year demonstrated a way of exploiting the nature of the PDF as file format. Until recently, the PDF never really got caught at the anti-spam gates. Thus, although most anti-spam products now check PDFs and other forms of image spam, PDF containing spam made it into millions of inboxes everywhere. Although not immediately threatening as code executions, spam is still spam and has the ability to deliver Trojans, viruses, and malware.<\/span><!--more--><\/p>\n<p><span lang=\"EN-CA\">3) <\/span><strong><span lang=\"EN-CA\">PDF Ubiquity<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">PDF files are <\/span><span lang=\"EN-CA\">perfect for spreading attacks far and wide. The ubiquity of the PDF makes this possible. The number of PDF files on the web alone is an example of what the odds are of being hit by an infected PDF.<\/span><\/p>\n<p><span lang=\"EN-CA\">4) <\/span><strong><span lang=\"EN-CA\">PDF Hyperlinks<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">As with most spam, the attacker\u2019s malware doesn&#8217;t just sit within the PDF file. Rather, it is through the embedded hyperlinks within the PDF that launches it. <\/span><\/p>\n<p><span lang=\"EN-CA\">5) <\/span><strong><span lang=\"EN-CA\">PDF Credibility<\/span><\/strong><\/p>\n<p>The PDF is known as secured standard format used by many business industries and users alike. As such, hackers can accomplish their task easily by turning users into malware executioners. Just by thinking that your PDF attachment or download is safe and secure, the attackers\u2019 work is done.<\/p>\n<p><span lang=\"EN-CA\">6) <\/span><strong><span lang=\"EN-CA\">Browsers and PDF URIs<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">PDFs are also manipulated because of the way in which their URIs are handled by certain web browser applications. <\/span><span lang=\"EN-CA\">Websites that host PDF files are unknowingly cohorts in the attack. XSS, for instance, uses a flaw in the browser that triggers an unintended execution of code as part of a query string contained within the URL. Although the browsers that contained this URI validation flaw were patched up with the last software version updates, this single flaw put every user with those browsers at risk.<\/span><\/p>\n<p><span lang=\"EN-CA\">7) <\/span><strong><span lang=\"EN-CA\">PC Software<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">Because a PDF\u2019s URI can be crafted with malicious JavaScript code, it can take advantage of applications that are installed on a PC. The open parameters within PDF URIs <\/span><span lang=\"EN-CA\">allow commands to be sent to the program when the file is opened. <\/span><span lang=\"EN-CA\">The most commonly installed software on computers, such as PDF vi<\/span><span lang=\"EN-CA\">ewers, are targeted because of this integration with the OS.<\/span><\/p>\n<p>8 ) <strong><span lang=\"EN-CA\">PDF Usage<\/span><\/strong><\/p>\n<p>Essential to <span lang=\"EN-CA\">business industries and government agencies, PDF usage goes hand in hand with the format\u2019s ubiquity and credibility. Being transmitted, viewed and stored between databases that hold sensitive and confidential information, the PDF format makes an ideal format for attackers to use. <\/span><\/p>\n<p>9) <strong><span lang=\"EN-CA\">Lack Of Security Settings<\/span><\/strong><\/p>\n<p><span lang=\"EN-CA\">Obviously, on the more simple PDF creation level, a lack of PDF security settings makes all the difference. The PDF content itself is vulnerable to being manipulated without customized file usage restrictions, passwords, high encryption strength, and <\/span>digital signatures. The basic one step PDF creation process isn\u2019t a strong defense when it comes to protecting your PDF content.<\/p>\n<p>10) <strong>PDF As An Email Attachment<\/strong><\/p>\n<p><span lang=\"EN-CA\">Something wrong always happens when it comes to emailing a PDF. When receiving a PDF file via email, the PDF is first stored before it can be opened in a designated viewer. Needless to say, attackers use this characteristic process to execute their attacks from the local host. <\/span><\/p>\n<p>11) <strong>PDF Specification<\/strong><\/p>\n<p>Having the PDF specification published makes it easy for developers to create third party tools for the PDF format and its software applications. However, it also means that it\u2019s easy for attackers to generate malevolent uses for the PDF and develop work-arounds to manipulate regular PDF functionalities.<\/p>\n<p>12) <strong>User Habits<\/strong><\/p>\n<p><span lang=\"EN-CA\">A<\/span>nother reason why hackers target this format is simply because not <span lang=\"EN-CA\">man<\/span>y people update their PDF software on a regular basis.<span lang=\"EN-CA\"> While attackers try to find weak spots in the latest software, their past work can still do damage on systems via PDF applications that haven\u2019t yet been updated<\/span><span lang=\"EN-CA\">. <\/span><\/p>\n<p>13) <strong>PDF Features and Functions<\/strong><\/p>\n<p>The PDF imports and <span lang=\"EN-CA\">integrates<\/span><span lang=\"EN-CA\">many functionalities that make it inherently vulnerable and prone to exploitation. The more the PDF format advances in form and function, the more opportunities there are for exploiting the format. <\/span><\/p>\n<p><span lang=\"EN-CA\">As more PDF related flaws are being exploited quicker than they are being patched, it\u2019s important to keep an eye out for these things as nothing digital is ever completely safe.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What makes the PDF so enticing to malicious users? There are more reasons than you think. With the recent headlines about Adobe PDF vulnerabilities being taken advantage of, just about anyone who used a PC was on the alert. PDF files have the potential to do some serious damage to systems and data when infected. &#8230; <a title=\"13 Ways The PDF Is Vulnerable\" class=\"read-more\" href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\" aria-label=\"More on 13 Ways The PDF Is Vulnerable\">Continue reading \u2192<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[56,32,65,59],"class_list":["post-84","post","type-post","status-publish","format-standard","hentry","category-5-top-tech-lists","tag-pdf","tag-pdf-file","tag-security","tag-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>13 Ways The PDF Is Vulnerable<\/title>\n<meta name=\"description\" content=\"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"13 Ways The PDF Is Vulnerable\" \/>\n<meta property=\"og:description\" content=\"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\" \/>\n<meta property=\"og:site_name\" content=\"PDF Blog | Investintech PDF Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2008-01-20T15:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-13T12:25:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\" \/>\n<meta name=\"author\" content=\"Reena\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@able2extract\" \/>\n<meta name=\"twitter:site\" content=\"@able2extract\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\"},\"author\":{\"name\":\"Reena\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\"},\"headline\":\"13 Ways The PDF Is Vulnerable\",\"datePublished\":\"2008-01-20T15:48:00+00:00\",\"dateModified\":\"2019-09-13T12:25:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\"},\"wordCount\":843,\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\",\"keywords\":[\"PDF\",\"pdf file\",\"security\",\"tips\"],\"articleSection\":[\"Top Tech Lists\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\",\"name\":\"13 Ways The PDF Is Vulnerable\",\"isPartOf\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\",\"datePublished\":\"2008-01-20T15:48:00+00:00\",\"dateModified\":\"2019-09-13T12:25:49+00:00\",\"description\":\"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\",\"contentUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png\",\"width\":234,\"height\":291,\"caption\":\"PDF Logo\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.investintech.com\/resources\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"13 Ways The PDF Is Vulnerable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#website\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"description\":\"Everything PDF\",\"publisher\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#organization\",\"name\":\"PDF Blog | Investintech PDF Solutions\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"contentUrl\":\"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp\",\"width\":270,\"height\":40,\"caption\":\"PDF Blog | Investintech PDF Solutions\"},\"image\":{\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/able2extract\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409\",\"name\":\"Reena\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g\",\"caption\":\"Reena\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"13 Ways The PDF Is Vulnerable","description":"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html","og_locale":"en_US","og_type":"article","og_title":"13 Ways The PDF Is Vulnerable","og_description":"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.","og_url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html","og_site_name":"PDF Blog | Investintech PDF Solutions","article_published_time":"2008-01-20T15:48:00+00:00","article_modified_time":"2019-09-13T12:25:49+00:00","og_image":[{"url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png","type":"","width":"","height":""}],"author":"Reena","twitter_card":"summary_large_image","twitter_creator":"@able2extract","twitter_site":"@able2extract","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#article","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html"},"author":{"name":"Reena","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409"},"headline":"13 Ways The PDF Is Vulnerable","datePublished":"2008-01-20T15:48:00+00:00","dateModified":"2019-09-13T12:25:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html"},"wordCount":843,"publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage"},"thumbnailUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png","keywords":["PDF","pdf file","security","tips"],"articleSection":["Top Tech Lists"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html","url":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html","name":"13 Ways The PDF Is Vulnerable","isPartOf":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage"},"thumbnailUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png","datePublished":"2008-01-20T15:48:00+00:00","dateModified":"2019-09-13T12:25:49+00:00","description":"Even though PDF files always pose a security risk, you can still prevent them from infecting your computer by taking precautions against these 13 things.","breadcrumb":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#primaryimage","url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png","contentUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2008\/01\/pdf-logo.png","width":234,"height":291,"caption":"PDF Logo"},{"@type":"BreadcrumbList","@id":"https:\/\/www.investintech.com\/resources\/blog\/archives\/84-13-ways-the-pdf-is-vulnerable.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.investintech.com\/resources\/blog\/"},{"@type":"ListItem","position":2,"name":"13 Ways The PDF Is Vulnerable"}]},{"@type":"WebSite","@id":"https:\/\/www.investintech.com\/resources\/blog\/#website","url":"https:\/\/www.investintech.com\/resources\/blog\/","name":"PDF Blog | Investintech PDF Solutions","description":"Everything PDF","publisher":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.investintech.com\/resources\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.investintech.com\/resources\/blog\/#organization","name":"PDF Blog | Investintech PDF Solutions","url":"https:\/\/www.investintech.com\/resources\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","contentUrl":"https:\/\/www.investintech.com\/resources\/blog\/wp-content\/uploads\/2024\/12\/Investintech-apryse-logo-w270.webp","width":270,"height":40,"caption":"PDF Blog | Investintech PDF Solutions"},"image":{"@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/able2extract"]},{"@type":"Person","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/9d21ba7980d32dbd36069a4878f8e409","name":"Reena","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.investintech.com\/resources\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aceff76f1b124f7ffb271de50b78f12a7599655c7087ea3a656b61cf9a89c376?s=96&d=mm&r=g","caption":"Reena"}}]}},"_links":{"self":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/84","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/comments?post=84"}],"version-history":[{"count":4,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/84\/revisions"}],"predecessor-version":[{"id":9625,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/posts\/84\/revisions\/9625"}],"wp:attachment":[{"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/media?parent=84"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/categories?post=84"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.investintech.com\/resources\/blog\/wp-json\/wp\/v2\/tags?post=84"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}