{"id":3558,"date":"2019-02-07T14:05:27","date_gmt":"2019-02-07T14:05:27","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3558"},"modified":"2019-02-07T14:05:27","modified_gmt":"2019-02-07T14:05:27","slug":"the-rise-of-the-gaming-data-breach","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach","title":{"rendered":"The rise of the gaming data breach"},"content":{"rendered":"<p>Are we in the midst of a rise in gaming data breach incidents? As more and more games are now full of consumables, we know hackers are targeting the gaming industry.<\/p>\n<p>We recently wrote about the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/fortnite-hackers-making-a-mint\" target=\"_blank\" rel=\"noopener\"><strong>Fortnite hackers<\/strong><\/a> who have been reportedly making a mint off the back of stealing other people\u2019s accounts and selling them on. Teenagers are being recruited to get involved in mass hacking jobs that appear relatively easy to carry out.<\/p>\n<p>When you consider that the gaming industry is now an even more lucrative market as a result of consumables like loot boxes and other in-game purchases, digital property can be an attractive and profitable target.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Hackers target gaming data breaches<\/strong><\/h3>\n<p>It\u2019s likely that hackers are targeting gaming data breaches. With the huge volumes of digital property that could be gleaned from stealing accounts, it can be a lucrative business. What you have to consider is the fact that there are millions of people playing online games. A lot of them are youngsters who can be easily tempted to get involved in hacking to make extra cash.<\/p>\n<p>Or in some cases, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/fortnite-hackers-making-a-mint\" target=\"_blank\" rel=\"noopener\"><strong>as we recently reported, they can make thousands from hacking<\/strong>.<\/a><\/p>\n<p>With the rise in consumables and online subscriptions, online gaming data breaches can yield a lot of information for hackers. Personal information and payment card data can be at risk on top of the digital property people have built up.<\/p>\n<p>There has also reportedly been rises in so-called \u201cfriendly fraud\u201d where kids are using their parents\u2019 cards to buy things without proper permission. The issue here is not only the risk for the cardholder but the fact that it can be easy to do. Some feel the online gaming industry is far too lax when it comes to monitoring youngsters\u2019 activities.<\/p>\n<h3><strong>Gaming data breaches and Collection #1<\/strong><\/h3>\n<p>There\u2019s an obvious link between the recent monumental so-called <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/collection-1-data-breach-shows-how-vulnerable-people-are\" target=\"_blank\" rel=\"noopener\"><strong>Collection #1 data breach<\/strong><\/a> that saw some 700 million email addresses and passwords published online. Easy targets for hackers are those who reuse credentials, and it\u2019s fair to suspect that youngsters who aren\u2019t as savvy as adults when it comes to online security may be easy targets.<\/p>\n<p>These accounts can be valuable if they\u2019re taken over and resold \u2013 as we discussed in the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/fortnite-hackers-making-a-mint\" target=\"_blank\" rel=\"noopener\"><strong>recent Fortnite article<\/strong><\/a>. The fact of the matter is that the industry is probably going to keep growing, and consumables are the new way for developers to make more cash. The way I see it, gaming data breach incidents are inevitable, and may well sharply rise in years to come.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are we in the midst of a rise in gaming data breach incidents? As more and more games are now full of consumables, we know hackers are targeting the gaming industry. We recently wrote about the Fortnite hackers who have been reportedly making a mint off the back of stealing other people\u2019s accounts and selling &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The rise of the gaming data breach<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1668,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,53,8,19,1,64,51],"tags":[26,55,10,20,13,7],"class_list":["post-3558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-data","category-hacking-news","category-info","category-latest","category-security","category-technology","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-online-security","tag-personal-data","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-07T14:05:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"The rise of the gaming data breach\",\"datePublished\":\"2019-02-07T14:05:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach\"},\"wordCount\":434,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/onelogin-data-breach-min.png\",\"keywords\":[\"cyber crime\",\"cybersecurity\",\"data breach\",\"online security\",\"personal data\",\"ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Data\",\"Hacking News\",\"Info\",\"Latest\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach\",\"name\":\"The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/onelogin-data-breach-min.png\",\"datePublished\":\"2019-02-07T14:05:27+00:00\",\"description\":\"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/onelogin-data-breach-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/onelogin-data-breach-min.png\",\"width\":725,\"height\":250,\"caption\":\"onelogin data breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/the-rise-of-the-gaming-data-breach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The rise of the gaming data breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks","description":"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach","og_locale":"en_GB","og_type":"article","og_title":"The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks","og_description":"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-02-07T14:05:27+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"The rise of the gaming data breach","datePublished":"2019-02-07T14:05:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach"},"wordCount":434,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png","keywords":["cyber crime","cybersecurity","data breach","online security","personal data","ransomware"],"articleSection":["Cybersecurity","Data","Hacking News","Info","Latest","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach","name":"The rise of the gaming data breach - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png","datePublished":"2019-02-07T14:05:27+00:00","description":"Are we in the midst of a rise in gaming data breach incidents? More games are now full of consumables. We know hackers are targeting the gaming industry.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/onelogin-data-breach-min.png","width":725,"height":250,"caption":"onelogin data breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-rise-of-the-gaming-data-breach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"The rise of the gaming data breach"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3558"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3558\/revisions"}],"predecessor-version":[{"id":3559,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3558\/revisions\/3559"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1668"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}