{"id":3096,"date":"2025-03-27T10:22:13","date_gmt":"2025-03-27T09:22:13","guid":{"rendered":"https:\/\/trustlab.upct.es\/2025\/03\/27\/que-es-el-phishing\/"},"modified":"2025-09-19T10:38:44","modified_gmt":"2025-09-19T08:38:44","slug":"what-is-phishing","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2025\/03\/27\/what-is-phishing\/","title":{"rendered":"What is Phishing?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3096\" class=\"elementor elementor-3096 elementor-1805\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d8541d e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"6d8541d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d08180 elementor-widget elementor-widget-text-editor\" data-id=\"6d08180\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is a crucial aspect of our digital life. Among the most common threats is <strong>phishing<\/strong>, a technique used by cybercriminals to deceive users and obtain personal information, such as access credentials, banking data or confidential information.<\/p><p>Phishing is based on <strong>impersonating trusted entities<\/strong> (banks, technology companies, government institutions, etc.) to trick victims into falling into the trap.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9b2851f e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"9b2851f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1b0c3b elementor-widget elementor-widget-heading\" data-id=\"f1b0c3b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How does phishing work? Techniques that cybercriminals use to trick you<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8487aac elementor-widget elementor-widget-text-editor\" data-id=\"8487aac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing is based on <strong>impersonating trusted entities<\/strong> (banks, technology companies, government institutions, etc.) to trick victims into falling into the trap. Here we explain the most commonly used techniques:<\/p><ul><li><strong>Fake emails: <\/strong>attackers send fraudulent emails that appear to come from a real entity. They include links to fake pages asking for personal data.<\/li><li><strong>Cloned web pages<\/strong>: Web sites almost identical to the original ones are created for the victim to enter his or her credentials.<\/li><li><strong>Fraudulent text messages<\/strong> (smishing): Sent via SMS with dangerous links.<\/li><li><strong>Vishing phone calls:<\/strong> A supposed representative of a company or bank calls asking for confidential information.<\/li><li><strong>Malvertising:<\/strong> False advertising on the Internet that redirects to fraudulent websites.<\/li><li><strong>Impersonation on social networks:<\/strong> Fake accounts that impersonate companies or trustworthy people to defraud.<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d8cbb5 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"4d8cbb5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e2a866 elementor-widget elementor-widget-heading\" data-id=\"1e2a866\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to identify a Phishing attempt? Warning signs you should not ignore<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6fd8347 elementor-widget elementor-widget-text-editor\" data-id=\"6fd8347\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing attacks can be difficult to detect, especially when they are well designed. However, there are signs that can help you identify a scam attempt before it&#8217;s too late.<\/p><p>One of the first things you should check is the <strong>sender of the email<\/strong>. If the message comes from an unknown or slightly altered address (e.g., \u201csoporte@banco-seguro.com\u201d instead of \u201csoporte@bancoseguro.com\u201d), this is a clear red flag. Attackers often use minor variations in addresses to fool unsuspecting users.<\/p><p>Another common clue is the <strong>wording of the message<\/strong>. Do you notice grammatical errors or poorly structured sentences? Often, cybercriminals are not fluent in the language and their emails are full of spelling mistakes. If you receive a message from your bank with obvious errors, be immediately suspicious.<\/p><p>Urgency is also a recurring strategy. Phrases such as \u201c<em>Your account will be blocked in 24 hours if you do not update your information<\/em>\u201d seek to generate panic so that you make hasty decisions. If an email or SMS message tries to pressure you into acting without thinking, it&#8217;s best to stop and check before clicking on any link.<\/p><p>Speaking of links, here comes another common trick. <strong>Before clicking on a suspicious link, hover over it without clicking<\/strong>. This way you will be able to see the actual URL it will take you to. If the link looks strange, too long or does not match the company&#8217;s official website, it is best to avoid it.<\/p><p>Finally, unexpected attachments are a huge risk. Receiving a document or compressed file from an unknown sender is reason enough not to open it. Attackers often hide malware in these files to infect your device and steal sensitive information.<\/p><p>If you pay attention to these details, you will significantly reduce the risk of falling for a phishing attack. The key is caution: check, analyze and never act in haste when faced with suspicious messages.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50ce594 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"50ce594\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f08df2d e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"f08df2d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c4a9cd6 elementor-widget elementor-widget-heading\" data-id=\"c4a9cd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Are you interested in cybersecurity? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5a36da elementor-widget elementor-widget-text-editor\" data-id=\"e5a36da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Are you interested in cybersecurity?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef87da2 elementor-widget elementor-widget-shortcode\" data-id=\"ef87da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f2888-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"2888\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/3096#wpcf7-f2888-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"2888\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f2888-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/fieldset>\n <label> Your name\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" autocomplete=\"name\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n\n<label>Your email\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" autocomplete=\"email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n\n<button style=\"background-color: #1625ee; color: white;\">Send<\/button> <p style=\"display: none !important;\" class=\"akismet-fields-container\" data-prefix=\"_wpcf7_ak_\"><label>&#916;<textarea name=\"_wpcf7_ak_hp_textarea\" cols=\"45\" rows=\"8\" maxlength=\"100\"><\/textarea><\/label><input type=\"hidden\" id=\"ak_js_1\" name=\"_wpcf7_ak_js\" value=\"216\"\/><script>document.getElementById( \"ak_js_1\" ).setAttribute( \"value\", ( new Date() ).getTime() );<\/script><\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d63068d e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"d63068d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2309fd9 elementor-widget elementor-widget-image\" data-id=\"2309fd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"494\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1024x632.jpg\" class=\"attachment-large size-large wp-image-2865\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1024x632.jpg 1024w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-300x185.jpg 300w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-768x474.jpg 768w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-1536x948.jpg 1536w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/couple_mobile-1-2048x1264.jpg 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a922c79 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"a922c79\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2ef650 elementor-widget elementor-widget-heading\" data-id=\"d2ef650\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Types of Phishing: What are the most common forms of attack?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6b3891 elementor-widget elementor-widget-text-editor\" data-id=\"f6b3891\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>Traditional Phishing<\/h3><p>This is the classic method that most people have encountered at some point. Attackers send emails that appear to come from legitimate institutions such as banks, service providers or even popular businesses. These messages usually include links to fake websites designed to capture your credentials or personal data.<\/p><h3>Spear Phishing<\/h3><p>This is a more sophisticated and personalized attack. Unlike traditional phishing, spear phishing specifically targets specific individuals or companies. Attackers research their victim to personalize the message, making it appear genuine and relevant.<\/p><h3>Smishing<\/h3><p>Phishing is not limited to email. Smishing uses SMS messages or instant messaging applications to send malicious links or fake phone numbers. Typically, these messages create a sense of urgency, such as warnings of blocked accounts or enticing promotions.<\/p><h3>Vishing<\/h3><p>Here the attack is carried out via phone calls. Fraudsters pose as employees of banks, technical services or government institutions to obtain confidential information. They often use intimidation tactics or emotional manipulation.<\/p><h3>Pharming<\/h3><p>This is a more technical attack that manipulates the DNS (Domain Name System) to redirect the user to fake websites without the user noticing. Unlike traditional phishing, it does not rely on the victim clicking on a link, but automatically redirects their traffic to a fraudulent site.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b508ad3 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"b508ad3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9dbdc9e elementor-widget elementor-widget-heading\" data-id=\"9dbdc9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The importance of staying protected in the digital age<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-05a7425 elementor-widget elementor-widget-text-editor\" data-id=\"05a7425\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing is one of the biggest threats on the Internet. <strong>Staying informed, being cautious and applying good digital security practices is key to avoid falling into these traps<\/strong>. Protect your information and help raise awareness about the risks of phishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd007a5 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"dd007a5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ff779af e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"ff779af\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-50e1105 elementor-widget elementor-widget-heading\" data-id=\"50e1105\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">You know what phishing is... now learn how to avoid it<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-415bdce elementor-widget elementor-widget-text-editor\" data-id=\"415bdce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p class=\"\" data-start=\"246\" data-end=\"743\">Now that you know what phishing is, how it works and what signs to look out for to detect it, it&#8217;s time to take the next step: <strong>learning how to protect yourself in a practical and effective way<\/strong>. In our article \ud83d\udc49 <a href=\"https:\/\/trustlab.upct.es\/2025\/04\/09\/como-evitar-el-phishing\/\">How to avoid phishing <\/a> \u00a0<\/p><p>Here you will find clear and actionable recommendations to keep your information safe on a daily basis. Because understanding the problem is just the beginning&#8230; taking action is what really makes the difference.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3946be3 e-con-full e-flex rael-particle-no qodef-elementor-content-no e-con e-child\" data-id=\"3946be3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e621780 elementor-widget elementor-widget-image\" data-id=\"e621780\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/trustlab.upct.es\/2025\/04\/09\/como-evitar-el-phishing\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/Phishing-5-1-1024x576.png\" class=\"attachment-large size-large wp-image-3091\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/Phishing-5-1-1024x576.png 1024w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/Phishing-5-1-300x169.png 300w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/Phishing-5-1-768x432.png 768w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2025\/03\/Phishing-5-1.png 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a crucial aspect of our digital life. Among the most common threats is phishing, a technique used by cybercriminals to deceive users and obtain personal information, such as access credentials, banking data or confidential information. Phishing is based on impersonating trusted entities (banks, technology companies, government institutions, etc.) to trick victims into falling [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3096","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3096"}],"version-history":[{"count":7,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3096\/revisions"}],"predecessor-version":[{"id":3213,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3096\/revisions\/3213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/3098"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}