{"id":3002,"date":"2018-04-24T12:22:47","date_gmt":"2018-04-24T11:22:47","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3002"},"modified":"2018-04-24T12:22:47","modified_gmt":"2018-04-24T11:22:47","slug":"uber-data-breach-lesson-how-not-handle-cyberattack","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack","title":{"rendered":"Uber data breach was a lesson in how NOT to handle a cyberattack"},"content":{"rendered":"<p>The <a href=\"\/blog\/uber-hack-hackers-paid-off-keep-quiet-huge-data-breach\" target=\"_blank\" rel=\"noopener\" style=\"font-weight: bold;\">Uber data breach<\/a> was a clear lesson in how <strong>NOT to handle a cyberattack<\/strong>. When the hackers contacted Uber by email, back in November 2016, they demanded a six-figure sum in order to destroy the wealth of data they&#8217;d stolen so news of the breach would quietly fade away once the bribe had been paid.<\/p>\n<p>As opposed to dealing with the data breach in the appropriate way, <a href=\"\/blog\/uber-hack-hackers-paid-off-keep-quiet-huge-data-breach\" target=\"_blank\" rel=\"noopener\" style=\"font-weight: bold;\">Uber decided to pay-off the hackers and cover the breach up<\/a>. A payment of $100,000 was reportedly made to the two hackers, and employees responsible for the security issue passed the whole thing off as a &#8220;bug bounty&#8221; program, which is where hackers are offered money to try and find weaknesses.<\/p>\n<p>In reality, they were simply hacked, and Uber have not only paid the heavy price of the bribe, but also the cost of a handling the crisis thereafter.<br \/>\n<!--more--><br \/>\nUnderstandably, <a href=\"\/blog\/uber-data-breach-governments-demand-answers\" target=\"_blank\" rel=\"noopener\" style=\"font-weight: bold;\">Uber has been slammed for its handling of the breach<\/a>. They failed to appropriately disclose that the details of some 57 million customers had been compromised, and the breach also reportedly included license information for over half a million of their drivers. <\/p>\n<p>Rather than doing the <strong>honourable thing and disclosing the breach<\/strong>, which is vital to ensure victims can prepare for the potential of being scammed, they instead <strong>hid the breach<\/strong> in efforts to cover it up.<\/p>\n<p>As a result of their deception, it has cost at least one employee their job and has likely harmed Uber&#8217;s reputation. On top of that, <a href=\"\/blog\/british-intelligence-law-enforcement-agencies-investigate-uber-hack\" target=\"_blank\" rel=\"noopener\" style=\"font-weight: bold;\">government and intelligence agency probes<\/a> have ensured Uber explains themselves and apologise for the way they handled the breach, which has turned into a serious crisis for the company.<\/p>\n<p>Their efforts to pass the breach off as a bug bounty has been labelled as &#8220;morally wrong and legally reprehensible&#8221;.<\/p>\n<p>We also understand that it wasn&#8217;t difficult for the hackers to break into Uber&#8217;s systems. They reportedly found legitimate access credentials on a storage area Uber engineers used on GitHub. The hackers then used the credentials to break into an Amazon cloud database they were using.<\/p>\n<h2>Organisations must never run from a data breach<\/h2>\n<p>Organisations must never run or shy away from a data breach. Although the first priority should be to ensure that servers and systems are safe and secure. If an organisation ever does fall foul of a breach, then victims should be informed as soon as possible in order to minimise any potential for scams and frauds to be committed using data stolen from a hack.<\/p>\n<p>The Uber data breach and the way they mishandled the whole situation is the perfect example of how NOT to deal with a breach and how NOT to handle a cyberattack effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When the hackers contacted Uber by email, back in November 2016, they demanded a six-figure sum in order to destroy the wealth of data they&#8217;d stolen so news of the breach would quietly fade away once the bribe had been &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Uber data breach was a lesson in how NOT to handle a cyberattack<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1985,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[2,10,50],"class_list":["post-3002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-news","tag-cyber-attack","tag-data-breach","tag-uber"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Uber Data Breach A Lesson On How NOT To Handle A CyberAttack<\/title>\n<meta name=\"description\" content=\"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who&#039;d stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uber Data Breach A Lesson On How NOT To Handle A CyberAttack\" \/>\n<meta property=\"og:description\" content=\"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who&#039;d stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-24T11:22:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-large-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"674\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-large-min.png\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Uber data breach was a lesson in how NOT to handle a cyberattack\",\"datePublished\":\"2018-04-24T11:22:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uber-taxi-settlement-min.png\",\"keywords\":[\"cyber attack\",\"data breach\",\"uber\"],\"articleSection\":[\"Hacking News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack\",\"name\":\"Uber Data Breach A Lesson On How NOT To Handle A CyberAttack\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uber-taxi-settlement-min.png\",\"datePublished\":\"2018-04-24T11:22:47+00:00\",\"description\":\"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who'd stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uber-taxi-settlement-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uber-taxi-settlement-min.png\",\"width\":725,\"height\":250,\"caption\":\"uber taxi settlement\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/uber-data-breach-lesson-how-not-handle-cyberattack#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uber data breach was a lesson in how NOT to handle a cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uber Data Breach A Lesson On How NOT To Handle A CyberAttack","description":"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who'd stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack","og_locale":"en_GB","og_type":"article","og_title":"Uber Data Breach A Lesson On How NOT To Handle A CyberAttack","og_description":"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who'd stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-04-24T11:22:47+00:00","og_image":[{"width":1200,"height":674,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-large-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-large-min.png","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Uber data breach was a lesson in how NOT to handle a cyberattack","datePublished":"2018-04-24T11:22:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack"},"wordCount":464,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-min.png","keywords":["cyber attack","data breach","uber"],"articleSection":["Hacking News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack","name":"Uber Data Breach A Lesson On How NOT To Handle A CyberAttack","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-min.png","datePublished":"2018-04-24T11:22:47+00:00","description":"The Uber data breach was a clear lesson in how NOT to handle a cyberattack. When Uber were contacted by the hackers who'd stolen a wealth of data back in November 2016, a six-figure bribe was demanded in order to destroy the evidence watch the breach quietly fade away.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uber-taxi-settlement-min.png","width":725,"height":250,"caption":"uber taxi settlement"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/uber-data-breach-lesson-how-not-handle-cyberattack#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Uber data breach was a lesson in how NOT to handle a cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3002"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3002\/revisions"}],"predecessor-version":[{"id":3004,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3002\/revisions\/3004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1985"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}