{"id":2582,"date":"2018-02-05T15:53:52","date_gmt":"2018-02-05T15:53:52","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=2582"},"modified":"2018-02-05T15:53:52","modified_gmt":"2018-02-05T15:53:52","slug":"kids-electronic-toys-vulnerable-hacking","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking","title":{"rendered":"Kids electronic toys may be vulnerable to hacking"},"content":{"rendered":"<p>In recent years, we&#8217;ve seen advancements in technology hurtle forward at an incredible pace, and children&#8217;s electronic toys can sometimes be at the forefront of such developments. Many kids don&#8217;t want plain teddy bears and dolls any more; they want intelligent robots that can interact with them.<\/p>\n<p>Consumer watchdog, <em>Which?<\/em>, joined up with a similar German organisation, <em>Stiftung Warentat<\/em>, and together they made the chilling discovery that a lot of popular kids electronic toys can apparently be hacked. Enlisting the help of third-party security experts, they tested seven different toys and four of them were vulnerable to hacking.<br \/>\n<!--more--><br \/>\n<strong>The following four failed the test:<\/strong><\/p>\n<div class=\"well\">\n<ul class=\"blog-list\">\n<li>CloudPet cuddly toys<\/li>\n<li>Furby connect<\/li>\n<li>I-Que intelligent robot<\/li>\n<li>Toy-fi Teddy<\/li>\n<\/ul>\n<\/div>\n<p>Adults can connect some of the above toys to their phones to control them remotely and communicate with a child. These toys reportedly have unsecured Bluetooth connections which means that <strong>third parties can access the connection without a password or a PIN<\/strong>. Okay, hackers may need to be in fairly close proximity to tap into the Bluetooth connection, but it still allows nearby neighbours &#8211; especially in tightly packed apartments &#8211; the opportunity to hack a nearby toy with ease.<\/p>\n<p>The experts managed to hack into the <em>Furby<\/em> using a laptop and uploaded their own audio file, which the <em>Furby<\/em> then played out. This means that hackers nearby could talk to children through their <em>Furby<\/em> toy.<\/p>\n<p>The risk to children is horrifying as they are vulnerable and often easy to manipulate. Hackers could in theory instruct a child to do anything they want.<\/p>\n<p>A similar situation reportedly played out with the <em>I-Que Intelligent Robot<\/em>. The experts simply downloaded the I-Que app, searched for a nearby device, and connected to it. From there, the experts could type anything they wanted into the text field and the robot would read it out loud.<\/p>\n<p>The same Bluetooth vulnerability allowed the experts to make audio messages for the <em>CloudPets<\/em> toys and the <em>Toy-go<\/em> Teddy. <strong><em>Which?<\/em> recommends that children do not play with these toys on their own<\/strong>.<\/p>\n<p><em>Wowee Chip<\/em>, a robot dog, apparently also has the same vulnerability, but experts were unable to use it to speak through it. Generally, Bluetooth connection only works within a 12 metre radius, but there are ways to extend the connection.<\/p>\n<p>Back in September 2015, <em>Smart Toy Bear<\/em> was discovered to be hackable. Hackers could get into the toy&#8217;s connected app and steal the child&#8217;s name, birth date, gender and other information. After manufacturer <em>Fisher-Price<\/em> found out about the vulnerability, they quickly patched it up. One of the researchers who discovered the breach, Rod Beardsley, warned that hackers could target the family and trick them into providing more information by phishing. He also noted that parents often use children&#8217;s names as their passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent years, we&#8217;ve seen advancements in technology hurtle forward at an incredible pace, and children&#8217;s electronic toys can sometimes be at the forefront of such developments. Many kids don&#8217;t want plain teddy bears and dolls any more; they want intelligent robots that can interact with them. Consumer watchdog, Which?, joined up with a similar &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Kids electronic toys may be vulnerable to hacking<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":2587,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[60],"class_list":["post-2582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-news","tag-toy-hacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kids Electronic Toys May Be Vulnerable To Hacking<\/title>\n<meta name=\"description\" content=\"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kids Electronic Toys May Be Vulnerable To Hacking\" \/>\n<meta property=\"og:description\" content=\"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-05T15:53:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"680\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\"},\"headline\":\"Kids electronic toys may be vulnerable to hacking\",\"datePublished\":\"2018-02-05T15:53:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking\"},\"wordCount\":471,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-electronic-toys-min.png\",\"keywords\":[\"toy hacking\"],\"articleSection\":[\"Hacking News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking\",\"name\":\"Kids Electronic Toys May Be Vulnerable To Hacking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-electronic-toys-min.png\",\"datePublished\":\"2018-02-05T15:53:52+00:00\",\"description\":\"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-electronic-toys-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/hacked-electronic-toys-min.png\",\"width\":725,\"height\":250,\"caption\":\"hacked electronic toys\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/kids-electronic-toys-vulnerable-hacking#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kids electronic toys may be vulnerable to hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/fc9f019d474c54972e7d226989280bfd\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/maisie\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kids Electronic Toys May Be Vulnerable To Hacking","description":"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking","og_locale":"en_GB","og_type":"article","og_title":"Kids Electronic Toys May Be Vulnerable To Hacking","og_description":"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-02-05T15:53:52+00:00","og_image":[{"width":1200,"height":680,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd"},"headline":"Kids electronic toys may be vulnerable to hacking","datePublished":"2018-02-05T15:53:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking"},"wordCount":471,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-min.png","keywords":["toy hacking"],"articleSection":["Hacking News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking","name":"Kids Electronic Toys May Be Vulnerable To Hacking","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-min.png","datePublished":"2018-02-05T15:53:52+00:00","description":"Consumer watchdog magazine, Which!, recently published an article detailing several popular kids electronic toys that have security issues such as unsecured Bluetooth allowing them to be hacked.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/hacked-electronic-toys-min.png","width":725,"height":250,"caption":"hacked electronic toys"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/kids-electronic-toys-vulnerable-hacking#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Kids electronic toys may be vulnerable to hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/fc9f019d474c54972e7d226989280bfd","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/81ea840bcfd73a45a8ad425b8e37aa8677eb68d5842c5b86b0101776ca2a5d8e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/maisie"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=2582"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2582\/revisions"}],"predecessor-version":[{"id":2588,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/2582\/revisions\/2588"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2587"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=2582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=2582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=2582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}