{"id":12833,"date":"2019-06-18T11:10:16","date_gmt":"2019-06-18T18:10:16","guid":{"rendered":"https:\/\/www.hellotech.com\/?p=12833"},"modified":"2021-09-21T04:52:01","modified_gmt":"2021-09-21T11:52:01","slug":"dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","status":"publish","type":"post","link":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","title":{"rendered":"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It"},"content":{"rendered":"\n<p>If you own a Dell computer, you could be vulnerable to security threats from one of its pre-installed applications. While the company once dubbed their \u201cSupportAssist\u201d application as \u201cthe industry\u2019s first automated proactive and predictive support technology,\u201d it was soon discovered to have a significant security flaw.<\/p>\n\n\n\n<p>Starting in October, the app has given cybercriminals the ability to hack into new Dell computers running Windows. According to Bill Demirkapi, a 17-year-old security researcher, Dell\u2019s support technology was susceptible to remote code execution attacks.<\/p>\n\n\n\n<p>Basically, the app gave hackers the ability to install malware (malicious software) on most new Dell computers. This could help hackers steal private information, such as bank details, or even take control of your computer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-dell-supportassist-vulnerability-users-are-open-to-hacks\">Dell SupportAssist Vulnerability &#8211; Users Are Open to Hacks<\/h2>\n\n\n\n<p>The SupportAssist tool is the primary remote support tool offered by Dell to its laptop users. It is designed to perform necessary maintenance tasks, such as diagnostics, driver updates, and debugging your computer.<\/p>\n\n\n\n<div class=\"wp-block-image wp-image-13012\"><figure class=\"aligncenter size-full is-resized\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist.jpg\" alt=\"Dell supportassist not working\" class=\"wp-image-13012\" width=\"666\" height=\"0\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist.jpg 1174w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist-300x156.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist-770x399.jpg 770w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Supportassist-210x109.jpg 210w\" sizes=\"(max-width: 1174px) 100vw, 1174px\" \/><\/span><figcaption>The Dell SupportAssist tool is under threat. (Image Source: <a href=\"https:\/\/www.dell.com\/support\/contents\/ph\/en\/phbsdt1\/article\/product-support\/self-support-knowledgebase\/software-and-downloads\/supportassist\" target=\"_blank\" rel=\"noopener noreferrer\">Dell<\/a>)<\/figcaption><\/figure><\/div>\n\n\n\n<p>However, Demirkapi identified vulnerabilities with this particular tool. He cited that the SupportAssist is vulnerable to remote code execution attacks, which are some of the most severe types of flaws in a computer system.<\/p>\n\n\n\n<p>Once in your computer, a hacker can install whatever they want on your computer without your knowledge. And, since the app was pre-installed on all Dell laptops and desktops, there are potentially millions of computer users that have been affected by this particular flaw.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-does-the-attack-happen\"><b>How Does the Attack Happen?<\/b><\/h2>\n\n\n\n<p>The app was made to proactively detect any hardware or software issues and install updates and drivers automatically.<\/p>\n\n\n\n<div class=\"wp-block-image wp-image-13013\"><figure class=\"aligncenter is-resized\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist.jpg\" alt=\"Dell supportassist download\" class=\"wp-image-13013\" width=\"666\" height=\"0\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist.jpg 974w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist-300x227.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist-770x583.jpg 770w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell-SupportAssist-210x159.jpg 210w\" sizes=\"(max-width: 974px) 100vw, 974px\" \/><\/span><figcaption>Beware of a recently identified vulnerability of Dell\u2019s SupportAssist tool. (Image Source: <a href=\"https:\/\/www.dell.com\/support\/contents\/ph\/en\/phbsdt1\/article\/product-support\/self-support-knowledgebase\/software-and-downloads\/supportassist\" target=\"_blank\" rel=\"noopener noreferrer\">Dell<\/a>)<\/figcaption><\/figure><\/div>\n\n\n\n<p>While this may be convenient, it can become problematic if those updates got hijacked. Hackers can use the app to further breach a computer by installing something nasty on a user\u2019s computer without knowing it.<\/p>\n\n\n\n<p>While Dell implemented security measures in the app to prevent users from downloading any illegitimate or malicious software, hackers had several ways to bypass these \u201cintegrity checks.\u201d<br>Demirkapi <a href=\"https:\/\/d4stiny.github.io\/Remote-Code-Execution-on-most-Dell-computers\/\">showed<\/a> how hackers could intercept requests from the SupportAssist and redirect the user to download a file from a URL and run it.<\/p>\n\n\n\n<p>The security flaw is particularly nasty, considering that Dell\u2019s SupportAssist has access to Windows on an administrator level. It practically holds the key to anything and everything vital to a computer system.<\/p>\n\n\n\n<p>There is some reason to feel relieved, though since a Dell computer is only vulnerable if a hacker shares the same local network as the user. So it is best to steer clear of public Wi-Fi networks at the local coffee shop if you own a Dell.<\/p>\n\n\n\n<p>Large corporate networks were also a potential target. It only takes one end user to plug in and start <a href=\"https:\/\/www.hellotech.com\/blog\/secure-passwords\">hacking<\/a>. With more computers linked to the system, a hacker will have access to more computers.<\/p>\n\n\n\n<p>Cybercriminal can also compromise someone\u2019s router by fooling the SupportAssist tool.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-fix-dell-supportassist\"><b>How to Fix Dell SupportAssist<\/b><\/h2>\n\n\n\n<p>Since the security threat was made known, Dell has issued patches to correct flaws with the SupportAssist tool. The company was quick to respond to Demirkapi\u2019s report.<\/p>\n\n\n\n<p>The company released a <a href=\"https:\/\/www.dell.com\/support\/article\/us\/en\/04\/sln316857\/dsa-2019-051-dell-supportassist-client-multiple-vulnerabilities?lang=en\">patch<\/a> on April 23. The SupportAssist v3.2.0.90 is now available for download from the company\u2019s official website.<\/p>\n\n\n\n<p>Users can also update the app via the popups and alerts from Dell. Unfortunately, many users tend to ignore such popups, resulting in potential security threats.<\/p>\n\n\n\n<p>So if you own a Dell, the best thing you can do is update your bundled software to protect your system. It is also a good idea to stay away from open WiFi networks, such as those found in coffee shops and internet cafes.<\/p>\n\n\n<div style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"hello-817250222\"><a data-no-instant=\"1\" href=\"https:\/\/www.hellotech.com\/tech-support\/virus-removal?utm_campaign=Blog-BannerAd_Computer_Computer-virus&#038;utm_content=Computer-virus-SQUARE\" rel=\"noopener\" class=\"adv-link\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE.png\" alt=\"Computer Computer Virus Computer Virus SQUARE\"  srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE.png 555w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE-300x285.png 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE-210x200.png 210w\" sizes=\"(max-width: 555px) 100vw, 555px\" class=\"advanced-ads-image-detect\" width=\"555\" height=\"528\"  style=\"display: inline-block;\" \/><\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>If you own a Dell computer, you could be vulnerable to security threats from one of its pre-installed applications. While the company once dubbed their \u201cSupportAssist\u201d application as \u201cthe industry\u2019s first automated proactive and predictive support technology,\u201d it was soon discovered to have a significant security flaw. Starting in October, the app has given cybercriminals the ability to hack into new Dell computers running Windows. According to Bill Demirkapi, a 17-year-old security researcher, Dell\u2019s support technology was susceptible to remote [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":13017,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17594,17583,17605,17593],"tags":[],"class_list":["post-12833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computers","category-featured","category-latest","category-staying-safe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.10 (Yoast SEO v20.10) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Vulnerability Identified with Dell\u2019s SupportAssist Tool<\/title>\n<meta name=\"description\" content=\"The Dell SupportAssist vulnerability opens doors to cyber threats and should be removed or updated as soon as possible. Find out more about this.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It - The Plug - HelloTech\" \/>\n<meta property=\"og:description\" content=\"If you own a Dell computer, you could be vulnerable to security threats from one of its pre-installed applications. While the company once dubbed their\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\" \/>\n<meta property=\"og:site_name\" content=\"The Plug - HelloTech\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/hellotech\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-18T18:10:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-21T11:52:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"763\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Plug\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HelloTech\" \/>\n<meta name=\"twitter:site\" content=\"@HelloTech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\"},\"author\":{\"name\":\"The Plug\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9\"},\"headline\":\"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It\",\"datePublished\":\"2019-06-18T18:10:16+00:00\",\"dateModified\":\"2021-09-21T11:52:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"articleSection\":[\"Computers\",\"Featured\",\"Latest\",\"Staying Safe\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\",\"url\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\",\"name\":\"Security Vulnerability Identified with Dell\u2019s SupportAssist Tool\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\"},\"datePublished\":\"2019-06-18T18:10:16+00:00\",\"dateModified\":\"2021-09-21T11:52:01+00:00\",\"description\":\"The Dell SupportAssist vulnerability opens doors to cyber threats and should be removed or updated as soon as possible. Find out more about this.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hellotech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"name\":\"The Plug - HelloTech\",\"description\":\"Turn to The Plug for informative tech news that you can use. \",\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\",\"name\":\"HelloTech\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"contentUrl\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"width\":1000,\"height\":174,\"caption\":\"HelloTech\"},\"image\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/hellotech\",\"https:\/\/twitter.com\/HelloTech\",\"http:\/\/www.instagram.com\/hello_tech\",\"https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9\",\"name\":\"The Plug\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g\",\"caption\":\"The Plug\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Vulnerability Identified with Dell\u2019s SupportAssist Tool","description":"The Dell SupportAssist vulnerability opens doors to cyber threats and should be removed or updated as soon as possible. Find out more about this.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","og_locale":"en_US","og_type":"article","og_title":"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It - The Plug - HelloTech","og_description":"If you own a Dell computer, you could be vulnerable to security threats from one of its pre-installed applications. While the company once dubbed their","og_url":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","og_site_name":"The Plug - HelloTech","article_publisher":"http:\/\/www.facebook.com\/hellotech","article_published_time":"2019-06-18T18:10:16+00:00","article_modified_time":"2021-09-21T11:52:01+00:00","og_image":[{"width":763,"height":535,"url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2019\/06\/Dell.jpg","type":"image\/jpeg"}],"author":"The Plug","twitter_card":"summary_large_image","twitter_creator":"@HelloTech","twitter_site":"@HelloTech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#article","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it"},"author":{"name":"The Plug","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9"},"headline":"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It","datePublished":"2019-06-18T18:10:16+00:00","dateModified":"2021-09-21T11:52:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it"},"wordCount":641,"publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"articleSection":["Computers","Featured","Latest","Staying Safe"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","url":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it","name":"Security Vulnerability Identified with Dell\u2019s SupportAssist Tool","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/#website"},"datePublished":"2019-06-18T18:10:16+00:00","dateModified":"2021-09-21T11:52:01+00:00","description":"The Dell SupportAssist vulnerability opens doors to cyber threats and should be removed or updated as soon as possible. Find out more about this.","breadcrumb":{"@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hellotech.com\/blog\/dells-support-app-leaves-most-users-open-to-hackers-heres-how-to-fix-it#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hellotech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Dell\u2019s Support App Leaves Most Users Vulnerable to Hackers: Here\u2019s How To Fix It"}]},{"@type":"WebSite","@id":"https:\/\/www.hellotech.com\/blog\/#website","url":"https:\/\/www.hellotech.com\/blog\/","name":"The Plug - HelloTech","description":"Turn to The Plug for informative tech news that you can use. ","publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hellotech.com\/blog\/#organization","name":"HelloTech","url":"https:\/\/www.hellotech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","contentUrl":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","width":1000,"height":174,"caption":"HelloTech"},"image":{"@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/hellotech","https:\/\/twitter.com\/HelloTech","http:\/\/www.instagram.com\/hello_tech","https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ"]},{"@type":"Person","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/efb62d6b62f82d1d7bbc8adf533c81e9","name":"The Plug","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9194a713172b4cb4bf283598ab3b44332e60f248aca639a51e2c893cd79061a?s=96&d=mm&r=g","caption":"The Plug"}}]}},"_links":{"self":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/12833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/comments?post=12833"}],"version-history":[{"count":0,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/12833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media\/13017"}],"wp:attachment":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media?parent=12833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/categories?post=12833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/tags?post=12833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}