{"id":1018,"date":"2022-06-08T20:04:34","date_gmt":"2022-06-08T20:04:34","guid":{"rendered":"https:\/\/web.tarleton.edu\/technology\/?page_id=1018"},"modified":"2025-05-19T20:07:46","modified_gmt":"2025-05-19T20:07:46","slug":"phishing-2","status":"publish","type":"page","link":"https:\/\/www.tarleton.edu\/technology\/tech-spot\/phishing-2\/","title":{"rendered":"Email Phishing"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Email Phising <\/h1>\n\n\n\n<div class=\"wp-block-advgb-columns advgb-columns-wrapper\" id=\"advgb-cols-f72e56e4-a221-4be0-ae93-a860be94c9ab\"><div class=\"advgb-columns-container\"><div class=\"advgb-columns advgb-columns-row advgb-is-mobile advgb-columns-2 layout-23-13 mbl-layout-stacked gutter-30 vgutter-10 order-rtl\">\n<div class=\"wp-block-advgb-column advgb-column advgb-is-two-thirds-tablet advgb-is-full-mobile\" id=\"advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<p>There are many forms of email scam, but one of most common right now is phishing, which is an attempt by a malicious party to trick message recipients into taking actions that will reveal private information (like passwords) or cause malicious software to be installed on the recipient\u2019s computer. Understanding these attempts, learning to identify them, and knowing what action to take when such attempts are made can be crucial to protecting your information as well as Tarleton\u2019s.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-column advgb-column advgb-is-one-third-tablet advgb-is-full-mobile\" id=\"advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<div class=\"wp-block-advgb-button alignfull better-border\"><a class=\"wp-block-advgb-button_link advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c\" href=\"https:\/\/www.tarleton.edu\/technology\/tech-spot\/phishing-2\/#recent-scams\" target=\"_self\" rel=\"noopener noreferrer\"><span>View Recent Phishing Scams<\/span><\/a><\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Two Techniques: Spoofing and Hacking<\/h2>\n\n\n\n<p><strong>Spoofing<\/strong>&nbsp;occurs when a malicious party takes advantage of weaknesses in the Internet email system which enable them to forge the \u201cfrom\u201d address, allowing the malicious sender to pose as a trusted person or entity and trick the recipient into taking action which might reveal private or secret information or which might cause malicious software to be run on the recipient\u2019s computer. Spoofed messages do not come from or pass through the email system of the forged sender; they just give that appearance.<\/p>\n\n\n\n<p><strong>Hacking<\/strong>&nbsp;occurs when a malicious party has gained access to a victim\u2019s email address and password; for example, via a spoofed message from \u201c<a href=\"mailto:HelpDesk@tarleton.edu\">HelpDesk@tarleton.edu<\/a>\u201d or \u201c<a href=\"mailto:admin@microsoft.com\">admin@microsoft.com<\/a>\u201d directing the victim to \u201cvalidate their email account\u201d by clicking on a link and then entering credentials on a fake, but real-looking, web page. Once the malicious party has the victim\u2019s credentials, he\/she\/they can login as the victim and send unlimited messages of any kind, to anyone as the victim. The hacker effectively becomes the victim and can perpetrate further scams in the victim\u2019s name with no need to forge or spoof the victim\u2019s address.<\/p>\n\n\n\n<p>If you think an email is a phishing attempt, please contact the Tarleton Helpdesk at&nbsp;<a href=\"mailto:helpdesk@tarleton.edu\">helpdesk@tarleton.edu<\/a>&nbsp;or calling them at 254-968-9885.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-advgb-columns advgb-columns-wrapper\" id=\"advgb-cols-30c3ec2e-1d98-4dbb-8b2c-8a3e88895ff7\"><div class=\"advgb-columns-container\"><div class=\"advgb-columns advgb-columns-row advgb-is-mobile advgb-columns-2 layout-23-13 mbl-layout-stacked gutter-30 vgutter-10\">\n<div class=\"wp-block-advgb-column advgb-column advgb-is-two-thirds-tablet advgb-is-full-mobile\" id=\"advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<h2 class=\"wp-block-heading\">Did the Email Actually Come from Someone That You Trust?<\/h2>\n\n\n\n<p>Where did the email originate? Although the from in the following example appears valid, if you look closely, you&#8217;ll see that the mailto: is a Gmail account instead. If they don&#8217;t match, this is definitely a phishing attempt.<\/p>\n\n\n\n<p>Official email from A&amp;M System components will usually not originate from non-Tarleton accounts. Don&#8217;t be fooled by similar spellings, either (i.e. johntarleton@tarlleton.edu).<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-column advgb-column advgb-is-one-third-tablet advgb-is-full-mobile better-border\" id=\"advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<figure class=\"wp-block-image size-full is-resized no-padding-bottom\"><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakeemail.png\"><img loading=\"lazy\" decoding=\"async\" width=\"464\" height=\"100\" src=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakeemail.png\" alt=\"Email with highlighted address: execonsult@gmail.com.\" class=\"wp-image-1020\" style=\"width:402px;height:86px\" srcset=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakeemail.png 464w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakeemail-300x65.png 300w\" sizes=\"auto, (max-width: 464px) 100vw, 464px\" \/><\/a><\/figure>\n\n\n\n<div class=\"wp-block-group extra-padding has-background is-layout-flow wp-block-group-is-layout-flow\" style=\"background-color:#cccccc\">\n<p class=\"has-black-color has-text-color has-background\" style=\"background-color:#cccccc\">The&nbsp;<strong>From<\/strong>&nbsp;or&nbsp;<strong>Reply To<\/strong>&nbsp;email address is a different domain or slightly different spelling than the official email address.<\/p>\n<\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Is This Really the Site That You Wanted?<\/h2>\n\n\n\n<div class=\"wp-block-advgb-columns advgb-columns-wrapper\" id=\"advgb-cols-a33f9cdb-2194-4e72-98e7-e5a3c1e1e464\"><div class=\"advgb-columns-container\"><div class=\"advgb-columns advgb-columns-row advgb-is-mobile advgb-columns-2 layout-13-23 mbl-layout-stacked gutter-30 vgutter-10\">\n<div class=\"wp-block-advgb-column advgb-column advgb-is-one-third-tablet advgb-is-full-mobile better-border\" id=\"advgb-col-57296940-e689-463e-855f-b663852254d9\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<figure class=\"wp-block-image size-full is-resized no-padding-bottom\"><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakelink.png\"><img loading=\"lazy\" decoding=\"async\" width=\"523\" height=\"311\" src=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakelink.png\" alt=\"Email link mismatch warning with non-secure URL highlighted.\" class=\"wp-image-1021\" style=\"width:402px;height:239px\" srcset=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakelink.png 523w, https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/06\/fakelink-300x178.png 300w\" sizes=\"auto, (max-width: 523px) 100vw, 523px\" \/><\/a><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-advgb-column advgb-column advgb-is-two-thirds-tablet advgb-is-full-mobile\" id=\"advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8\"><div class=\"advgb-column-inner\" style=\"border-style:none;border-width:1px\">\n<p>Where will the links take you when you click on them? When you hover your mouse cursor over links in an email, you should look to see whether the displayed link actually matches the text of the link in what you see when you are not hovering over it.<\/p>\n\n\n\n<p>In this case, when you hover over the link address in the email message, you will see a very different link that would take you to an unsecure site. This is a good indication that the email you are viewing is a phishing attempt.<\/p>\n<\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Avoid the Bait of a Phishing Scam<\/h2>\n\n\n\n<p>Online con-games are designed to prey on unsuspecting recipients with attention- getting emails that appear to come from legitimate institutions.<\/p>\n\n\n\n<p>Examples include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Financial institutions such as banks, savings and loans, or mortgage accounts<\/li>\n\n\n\n<li>A shipping or packaging company that has the words &#8216;Delivery Failure&#8217; in the subject line<\/li>\n\n\n\n<li>A fake email from an FBI Director, CIO or other high-ranking individual<\/li>\n\n\n\n<li>A message from &#8220;your&#8221; help desk or email service asking for account information, passwords or other personal information<\/li>\n<\/ul>\n\n\n\n<p>The messages may ask you to &#8216;update,&#8217; &#8216;validate,&#8217; or &#8216;confirm&#8217; account or email address information, or will include links that direct you to a site that looks like the actual Web site.<\/p>\n\n\n\n<p>The purpose is to trick you into divulging personal information or to download malicious code that can record all keystrokes including passwords or copy contact list information to scam friends and family or commit other crimes in the your name.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<div class=\"wp-block-group link-pop is-layout-flow wp-block-group-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.consumer.ftc.gov\/topics\/privacy-identity-online-security\" target=\"_blank\" rel=\"noreferrer noopener\">FTC Consumer Information &#8211; ID Theft, Privacy, &amp; Security: Privacy &amp; Security<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/safety\/online-privacy\/phishing-symptoms.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">How to recognize phishing email messages, links, or phone calls<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.dhs.gov\/topic\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">Department of Homeland Security | Cybersecurity<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/security.tamu.edu\/protect_myself\/Internet_and_Email_Scams.php\" target=\"_blank\" rel=\"noreferrer noopener\">Texas A&amp;M University &#8211; Social Engineering and Phishing Attacks<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">File a Complaint<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.tarleton.edu\/technology\/wp-content\/uploads\/sites\/170\/2022\/07\/electronic-info-complaints-standard.pdf\">Tarleton Rule: Electronic Information Resource Complaints<\/a><\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-scams\">Recent Phishing Scams<\/h2>\n\n\n\n<p>Open each drop-down to see what the most recent phishing scams look like.<\/p>\n\n\n\n<p>From: no-reply@sharepointonline.com<br>Date: 12\/18\/2019<br>Subject: XXX shared onedrive with you<\/p>\n\n\n\n<p>How are you doing today? Pls can you kindly view the document i sent you using one-drive office and let me have your opinion upon review and analysis.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>From: various senders<br>Date: 12\/18\/2019<br>Subject: Shop and Earn More<\/p>\n\n\n\n<p>Shoppers, Inc is now hiring part-time Mystery shopper. Earn $300 to $400 weekly. To apply and read more, click here&nbsp;<em>link that should not be accessed<\/em><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>From: various senders<br>Date: 12\/18\/2019<br>Subject: Help Desk!<\/p>\n\n\n\n<p>This is to notify you all that we are validating active accounts. Kindly confirm that your account is still in use by clicking the validation link below.<\/p>\n\n\n\n<p>Validate Email Account&nbsp;<em>(do not click link)<\/em><\/p>\n\n\n\n<p>Sincerely!<br>IT Help Desk<br>Office of Information Technology<\/p>\n<style class=\"advgb-styles-renderer\">#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c{font-size:18px;color:#ffffff !important;background-color:#4f2d7f !important;margin:0px 0px 0px 0px !important;padding:10px 30px 10px 30px;border-width:1px !important;border-style:none;border-radius:0px !important;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c:hover{box-shadow:1px 1px 12px 0px #ccc;opacity:1;transition:all 0.2s ease;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c > i {font-size:30px;color:inherit;float:left;margin-right:7px;}#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c{font-size:18px;color:#ffffff !important;background-color:#4f2d7f !important;margin:0px 0px 0px 0px !important;padding:10px 30px 10px 30px;border-width:1px !important;border-style:none;border-radius:0px !important;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c:hover{box-shadow:1px 1px 12px 0px #ccc;opacity:1;transition:all 0.2s ease;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c > i {font-size:30px;color:inherit;float:left;margin-right:7px;}#advgb-cols-f72e56e4-a221-4be0-ae93-a860be94c9ab{}@media screen and (max-width: 1023px) {#advgb-cols-f72e56e4-a221-4be0-ae93-a860be94c9ab{}}@media screen and (max-width: 767px) {#advgb-cols-f72e56e4-a221-4be0-ae93-a860be94c9ab{}}#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-a6c87301-df17-4f74-ad63-23afedc50bf1>.advgb-column-inner{}}#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-da3af01a-693a-49bc-ad6a-c138c0b218cb>.advgb-column-inner{}}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c{font-size:18px;color:#ffffff !important;background-color:#4f2d7f !important;margin:0px 0px 0px 0px !important;padding:10px 30px 10px 30px;border-width:1px !important;border-style:none;border-radius:0px !important;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c:hover{box-shadow:1px 1px 12px 0px #ccc;opacity:1;transition:all 0.2s ease;}.advgbbtn-f35be572-f92e-4de9-9681-f2f3e5b59e9c > i {font-size:30px;color:inherit;float:left;margin-right:7px;}#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}}#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}}#advgb-cols-30c3ec2e-1d98-4dbb-8b2c-8a3e88895ff7{}@media screen and (max-width: 1023px) {#advgb-cols-30c3ec2e-1d98-4dbb-8b2c-8a3e88895ff7{}}@media screen and (max-width: 767px) {#advgb-cols-30c3ec2e-1d98-4dbb-8b2c-8a3e88895ff7{}}#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-aad3dfa9-d41a-4ced-8f20-719d817015f0>.advgb-column-inner{}}#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-92dc7acc-bca3-41ab-bc06-5230388d735f>.advgb-column-inner{}}#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}}#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}}#advgb-cols-a33f9cdb-2194-4e72-98e7-e5a3c1e1e464{}@media screen and (max-width: 1023px) {#advgb-cols-a33f9cdb-2194-4e72-98e7-e5a3c1e1e464{}}@media screen and (max-width: 767px) {#advgb-cols-a33f9cdb-2194-4e72-98e7-e5a3c1e1e464{}}#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-57296940-e689-463e-855f-b663852254d9>.advgb-column-inner{}}#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}@media screen and (max-width: 1023px) {#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}}@media screen and (max-width: 767px) {#advgb-col-1813ebf2-1dc1-431a-aec3-890a8af10ac8>.advgb-column-inner{}}<\/style>","protected":false},"excerpt":{"rendered":"<p>Email Phising Two Techniques: Spoofing and Hacking Spoofing&nbsp;occurs when a malicious party takes advantage of weaknesses in the Internet email system which enable them to forge the \u201cfrom\u201d address, allowing &#8230;<\/p>\n","protected":false},"author":62,"featured_media":580,"parent":819,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":{"_acf_changed":false,"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","footnotes":""},"class_list":["post-1018","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/www.tarleton.edu\/technology\/author\/kyle-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-2-3\/","display_name":"kyle"},"relative_dates":{"created":"Posted 4 years ago","modified":"Updated 11 months ago"},"absolute_dates":{"created":"Posted on June 8, 2022","modified":"Updated on May 19, 2025"},"absolute_dates_time":{"created":"Posted on June 8, 2022 8:04 pm","modified":"Updated on May 19, 2025 8:07 pm"},"featured_img_caption":"","featured_img":false,"series_order":"","_links":{"self":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/1018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":3,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/1018\/revisions"}],"predecessor-version":[{"id":2570,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/1018\/revisions\/2570"}],"up":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/pages\/819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.tarleton.edu\/technology\/wp-json\/wp\/v2\/media?parent=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}