{"id":204,"date":"2019-03-12T01:36:37","date_gmt":"2019-03-11T23:36:37","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=204"},"modified":"2020-05-31T01:45:56","modified_gmt":"2020-05-30T23:45:56","slug":"scan-your-business-website-for-malware-attack","status":"publish","type":"post","link":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/","title":{"rendered":"Scan Your Business Website for malware attack"},"content":{"rendered":"<p style=\"text-align: justify;\">Digital security certificates ensure that the websites are genuine and authorized and are malware free. Users find it as a trust factor that the website they visit is safe and secure. However, consider the digital security certificates are compromised, how can users be secured from such compromised websites?<\/p>\n<p style=\"text-align: justify;\">The current digital security certificates that data transmitted between the website owners and the website visitors are encrypted and can be decoded only by private keys which is accessible only by the website owners. The encryption will help to protect sensitive business or customer-related\u00a0 information that gets transmitted through the website<\/p>\n<p style=\"text-align: justify;\">In the meantime, present-day antivirus programs instantly terminate sites that are not secured by such certificates, with this the hackers find it a challenge to inject malware code into devices by means of the infected site.<\/p>\n<p style=\"text-align: justify;\">As per a senior consultant from\u00a0<strong>KPMG<\/strong>, security certificates are considered to be a key trust-worthy factor because they require strict validation of payment and identity proof. The certificate is verified to check if it genuinely belongs to that intended entity \u2013 organization or person, that is mentioned in the certificate&#8217;. This prevents the hackers from attacking the website.<\/p>\n<p style=\"text-align: justify;\">To compromise a huge number of users&#8217; data, cyber-criminals are trying methods and techniques to steal security certificates or create their own security certificates marked by a\u00a0<strong>Certificate Authority<\/strong>, they would then be able to utilize such testaments to dodge antivirus protection system and to contaminate a large number of site visitors with malware.<\/p>\n<p style=\"text-align: justify;\">This works best for the hackers because, when antivirus software identifies a security certificate in place, they do not\u00a0<a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em><strong>scan the website for malware<\/strong><\/em><\/a>\u00a0activities. This enables hackers to exploit the website for a free run.<\/p>\n<p style=\"text-align: justify;\">&#8216;With an authentication, the malware is permitted to run. Bypassing these advancements can give way to a digital criminal association to establish a security breach&#8217;.<\/p>\n<p style=\"text-align: justify;\">With legitimate certificates being the source for hackers to enter, hackers find ways to steal genuine certificates and further using it to sell certificates to the\u00a0<strong>cyber-criminals<\/strong>. There are reports that some cyber-security breaches have happened recently just by exploiting the use of stolen legitimate digital certificates.<\/p>\n<p style=\"text-align: justify;\">&#8216;<strong>The implementation of genuine certificates can stay a standout amongst the best approaches to sidestep protection measures and keep malware running in the framework under the radar,&#8217;<\/strong>\u00a0says Marta Janus, senior threat specialist at Cyclance.<\/p>\n<p style=\"text-align: justify;\">&#8216;stealing certificates is not a complex task, so at first, this method used to be discovered basically in advanced targeted threats. It&#8217;s not surprising that digital-criminals understood the potential esteem that genuine security certificates can have on the underground market, and have found ways and techniques to loot such certificates.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital security certificates ensure that the websites are genuine and authorized and are malware free. Users find it as a trust factor that the website they visit is safe and secure. However, consider the digital security certificates are compromised, how can users be secured from such compromised websites? The current digital security certificates that data transmitted between the website owners and the website visitors are encrypted and can be decoded only by private keys which is accessible only by the website owners. The encryption will help to protect sensitive business or customer-related\u00a0 information that gets transmitted through the website In\u2026<\/p>\n","protected":false},"author":3,"featured_media":205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-204","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Scan Your Business Website for malware attack - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scan Your Business Website for malware attack - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Digital security certificates ensure that the websites are genuine and authorized and are malware free. Users find it as a trust factor that the website they visit is safe and secure. However, consider the digital security certificates are compromised, how can users be secured from such compromised websites? The current digital security certificates that data transmitted between the website owners and the website visitors are encrypted and can be decoded only by private keys which is accessible only by the website owners. The encryption will help to protect sensitive business or customer-related\u00a0 information that gets transmitted through the website In\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/hackermoz\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T23:36:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:45:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"751\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"Scan Your Business Website for malware attack\",\"datePublished\":\"2019-03-11T23:36:37+00:00\",\"dateModified\":\"2020-05-30T23:45:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/\"},\"wordCount\":448,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/download-4.png\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/\",\"name\":\"Scan Your Business Website for malware attack - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/download-4.png\",\"datePublished\":\"2019-03-11T23:36:37+00:00\",\"dateModified\":\"2020-05-30T23:45:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/download-4.png\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/download-4.png\",\"width\":751,\"height\":351},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/scan-your-business-website-for-malware-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Scan Your Business Website for malware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.com\",\"https:\\\/\\\/www.facebook.com\\\/hackermoz\\\/\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scan Your Business Website for malware attack - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Scan Your Business Website for malware attack - MozDomains Blog","og_description":"Digital security certificates ensure that the websites are genuine and authorized and are malware free. Users find it as a trust factor that the website they visit is safe and secure. However, consider the digital security certificates are compromised, how can users be secured from such compromised websites? The current digital security certificates that data transmitted between the website owners and the website visitors are encrypted and can be decoded only by private keys which is accessible only by the website owners. The encryption will help to protect sensitive business or customer-related\u00a0 information that gets transmitted through the website In\u2026","og_url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/","og_site_name":"MozDomains Blog","article_author":"https:\/\/www.facebook.com\/hackermoz\/","article_published_time":"2019-03-11T23:36:37+00:00","article_modified_time":"2020-05-30T23:45:56+00:00","og_image":[{"width":751,"height":351,"url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png","type":"image\/png"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"Scan Your Business Website for malware attack","datePublished":"2019-03-11T23:36:37+00:00","dateModified":"2020-05-30T23:45:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/"},"wordCount":448,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/","name":"Scan Your Business Website for malware attack - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png","datePublished":"2019-03-11T23:36:37+00:00","dateModified":"2020-05-30T23:45:56+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#primaryimage","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download-4.png","width":751,"height":351},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/scan-your-business-website-for-malware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Scan Your Business Website for malware attack"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website","url":"https:\/\/www.mozdomains.com\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1776421023","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.com","https:\/\/www.facebook.com\/hackermoz\/","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/204\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media\/205"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}