{"id":2728,"date":"2023-04-14T11:02:33","date_gmt":"2023-04-14T03:02:33","guid":{"rendered":"https:\/\/infosec.usm.my\/v1\/?p=2728"},"modified":"2023-04-17T13:35:56","modified_gmt":"2023-04-17T05:35:56","slug":"ways-to-detect-phishing-email","status":"publish","type":"post","link":"https:\/\/infosec.usm.my\/v1\/ways-to-detect-phishing-email\/","title":{"rendered":"Ways to Detect Phishing Email"},"content":{"rendered":"<p><strong>Phishing<\/strong>\u00a0is one of the branches of cybercrime that is becoming more widespread and often occurs nowadays.<br \/>\nNo matter how we try to avoid it, this phishing method is getting more and more cunning so that in the end we can\u2019t be sure which one is right and which one is wrong.<br \/>\nBecause of that, Infosec tries to provide ways methods for us to identify which one is true and which one is wrong.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing\u00a0is one of the branches of cybercrime that is becoming more widespread and often occurs nowadays. No matter how we try to avoid it, this phishing<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":4,"featured_media":2736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,1],"tags":[],"class_list":["post-2728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tutorial"],"_links":{"self":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/comments?post=2728"}],"version-history":[{"count":7,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2728\/revisions"}],"predecessor-version":[{"id":2744,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2728\/revisions\/2744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/media\/2736"}],"wp:attachment":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/media?parent=2728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/categories?post=2728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/tags?post=2728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}