{"id":64618,"date":"2023-01-25T18:01:01","date_gmt":"2023-01-25T10:01:01","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=64618"},"modified":"2023-03-13T18:10:22","modified_gmt":"2023-03-13T10:10:22","slug":"avoid-infected-usb-drives","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/","title":{"rendered":"5 Ways to Avoid an Infected USB Drive"},"content":{"rendered":"<p>USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically have to click a link to download anything, USB-delivered malware can infect your computer the moment you plug a flash drive in.<\/p>\n<p>Removable media like USB sticks are responsible for <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/expel.com\/blog\/top-attack-vectors-january-2022\/\">9% of all security incidents<\/a>, the second-most of any attack vector. That number goes up to 20% when you don\u2019t include incidents involving cloud services. That\u2019s a lot of attacks, so how can you ensure your USB isn\u2019t compromised? Start with these five steps.<\/p>\n<div class=\"ref-block ref-block--post\" id=\"ref-post-1\">\n\t\t\t\t\t<a href=\"https:\/\/www.hongkiat.com\/blog\/tools-to-protect-computer-from-infected-usb-drives\/\" class=\"ref-block__link\" title=\"Read More: Secure Your PC From Infected Thumb Drives: Tips & Tools\" rel=\"bookmark\"><span class=\"screen-reader-text\">Secure Your PC From Infected Thumb Drives: Tips & Tools<\/span><\/a>\n<div class=\"ref-block__thumbnail img-thumb img-thumb--jumbo\" data-img='{ \"src\" : \"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/tools-to-protect-computer-from-infected-usb-drives.jpg\" }'>\n\t\t\t\t\t\t\t<noscript>\n<style>.no-js #ref-block-post-10387 .ref-block__thumbnail { background-image: url(\"https:\/\/assets.hongkiat.com\/uploads\/thumbs\/250x160\/tools-to-protect-computer-from-infected-usb-drives.jpg\"); }<\/style>\n<\/noscript>\n\t\t\t\t\t\t<\/div>\n<div class=\"ref-block__summary\">\n<h4 class=\"ref-title\">Secure Your PC From Infected Thumb Drives: Tips & Tools<\/h4>\n<p class=\"ref-description\">\n\t\t\t\t\t\tA thumb drive or flash drive \u2014 is the most common portable data storage device. However, it can...\t\t\t\t\t\t<span>Read more<\/span><\/p>\n<\/div>\n<\/div>\n<h2>1. Avoid using unknown USB drives<\/h2>\n<p>The best way to avoid infected USB devices is not to use any you don\u2019t recognize. If someone gives you a flash drive or you find one in the wild, assume it\u2019s unsafe and don\u2019t plug it into your computer.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg\" alt=\"unknown USB\" width=\"800\" height=\"475\"><\/figure>\n<p>Handing out infected flash drives or leaving them for curious passers-by is a common social engineering technique that takes advantage of human weaknesses like curiosity. It plays a role in <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bdodigital.com\/insights\/cybersecurity\/cybersecurity-mistakes-midsize-organizations-make\">90% of security breaches<\/a> because it\u2019s so effective. People are naturally curious, and if a shiny new USB sits on the ground, they\u2019ll want to know what\u2019s on it.<\/p>\n<p>Avoid caving to that temptation if you want to stay safe. There\u2019s no way to tell where that drive came from or what it was plugged into before, so the risks outweigh any interesting things you might find.<\/p>\n<h2>2. Run Linux from a safe USB drive<\/h2>\n<p>You may not have an old or backup computer lying around. If that\u2019s the case, you can protect your files from a potentially compromised USB by running Linux off a different flash drive. Opening the suspicious USB in Linux will provide a barrier between any malware and your normal operating system.<\/p>\n<p>Linux is free to download and can run off a flash drive. Find a distribution, often called a <a href=\"https:\/\/www.hongkiat.com\/blog\/best-desktop-linux-distributions\/\">distro<\/a>, with a large support community like Ubuntu, then download it to a USB you know is safe. Follow the installation guide to run this new OS from your flash drive.<\/p>\n<h2>3. Use an old (or unimportant) computer<\/h2>\n<p>Your personal USB drives can get infected, too, so you need to know how to check them for malware. If you\u2019re suspicious and want to know more, find an old computer or one you don\u2019t use for anything important. Use this to check the drive instead of your main computer.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/old-laptop.jpg\" alt=\"old laptop\" width=\"800\" height=\"524\"><\/figure>\n<p>Malware won\u2019t be a big issue if your USB is infected but you plug it into a computer with no personal information or sensitive files. However, you must be sure there\u2019s nothing a hacker would find valuable on your device.<\/p>\n<p>Erase any important files or personal information and disconnect the computer from the Internet before plugging anything in.<\/p>\n<h2>4. Plug it in, scan it<\/h2>\n<p>Once you\u2019ve followed these other steps, it\u2019s time to check your USB. Run Linux if you\u2019re going that route, disconnect your computer from the Internet and open your <a href=\"https:\/\/www.hongkiat.com\/blog\/antivirus-software-mac\/\">antivirus software<\/a>. Then, plug the USB drive in.<\/p>\n<p>Use your anti-malware software to scan the drive. That process will look different depending on what software you use, but there should be clear instructions from the program\u2019s main menu. If your antivirus doesn\u2019t find anything, your USB is probably safe and you can use it normally.<\/p>\n<h2>5. Disable Autorun and use an Anti-malware app<\/h2>\n<p>Another step to take before plugging the suspicious USB in is disabling Autorun. As the name implies, this feature automatically runs external media like flash drives, which is how malware often infects your computer from a USB. You\u2019ll want to disable it to safely check your drive for viruses.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/anti-virus.jpg\" alt=\"anti-virus\" width=\"800\" height=\"533\"><\/figure>\n<p>You\u2019ll also need to install anti-malware software if you don\u2019t have any already. Even if you do, check for updates to ensure you can scan for the latest threats. It\u2019s a good idea to update all your other software while you\u2019re at it to be as safe as possible.<\/p>\n<h2>What to do with a compromised USB drive?<\/h2>\n<p>If your antivirus software finds an issue, you\u2019ll have to remove it from your drive. The program will likely let you automatically delete infected files, which is the safest way forward. Once you\u2019ve taken care of the suspicious files, restart your computer and follow these steps again to ensure you\u2019ve removed the malware.<\/p>\n<p>If you want to be as safe as possible, it\u2019s best not to use that USB drive again, even after removing the infected malware. <a href=\"https:\/\/www.hongkiat.com\/blog\/online-backup-sync-tools\/\">Keeping backups of all important files in the cloud<\/a> will let you discard these devices without worrying about losing the stuff you want.<\/p>\n<p>It\u2019s also a good idea to keep your online credentials on check to catch if anything slipped through the cracks. You can check the <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned<\/a> website to see if someone got hold of your credentials and watch your bank account and social media channels for suspicious activity.<\/p>\n<p>You should also use a <a href=\"https:\/\/www.hongkiat.com\/blog\/password-tools\/\">password manager<\/a>, change all your passwords and run frequent virus scans on your computer.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/haveibeenpwned.jpg\" alt=\"haveibeenpwned\" width=\"2158\" height=\"952\"><\/figure>","protected":false},"excerpt":{"rendered":"<p>USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically have to click a link to download anything, USB-delivered malware can infect your computer the moment you plug a flash drive in. Removable media like USB sticks are responsible for 9%&hellip;<\/p>\n","protected":false},"author":622,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3396],"tags":[3357,4604],"topic":[],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 Ways to Avoid an Infected USB Drive - Hongkiat<\/title>\n<meta name=\"description\" content=\"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ways to Avoid an Infected USB Drive\" \/>\n<meta property=\"og:description\" content=\"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-25T10:01:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-13T10:10:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg\" \/>\n<meta name=\"author\" content=\"April Miller\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rehackmagazine\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"April Miller\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/\"},\"author\":{\"name\":\"April Miller\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/c7f4755d0e529d10f4fe5a5c85be9283\"},\"headline\":\"5 Ways to Avoid an Infected USB Drive\",\"datePublished\":\"2023-01-25T10:01:01+00:00\",\"dateModified\":\"2023-03-13T10:10:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/avoid-infected-usb-drives\\\/unknown-usb.jpg\",\"keywords\":[\"Flash Drives\",\"Gadget Security and Privacy\"],\"articleSection\":[\"Gadgets\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/\",\"name\":\"5 Ways to Avoid an Infected USB Drive - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/avoid-infected-usb-drives\\\/unknown-usb.jpg\",\"datePublished\":\"2023-01-25T10:01:01+00:00\",\"dateModified\":\"2023-03-13T10:10:22+00:00\",\"description\":\"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#primaryimage\",\"url\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/avoid-infected-usb-drives\\\/unknown-usb.jpg\",\"contentUrl\":\"https:\\\/\\\/assets.hongkiat.com\\\/uploads\\\/avoid-infected-usb-drives\\\/unknown-usb.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/avoid-infected-usb-drives\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Ways to Avoid an Infected USB Drive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/c7f4755d0e529d10f4fe5a5c85be9283\",\"name\":\"April Miller\",\"description\":\"April is a professional senior writer at ReHack.com with a passion for all things tech related. She specializes in AI, cybersecurity, tech efficiency, and big data; while also writing on various other modern topics across the technology realm. You can find more of her work on ReHack.com or by following her on LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/rehack.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/april-j-miller\\\/\",\"https:\\\/\\\/x.com\\\/rehackmagazine\"],\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/aprilmiller\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 Ways to Avoid an Infected USB Drive - Hongkiat","description":"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/","og_locale":"en_US","og_type":"article","og_title":"5 Ways to Avoid an Infected USB Drive","og_description":"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically","og_url":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2023-01-25T10:01:01+00:00","article_modified_time":"2023-03-13T10:10:22+00:00","og_image":[{"url":"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg","type":"","width":"","height":""}],"author":"April Miller","twitter_card":"summary_large_image","twitter_creator":"@rehackmagazine","twitter_site":"@hongkiat","twitter_misc":{"Written by":"April Miller","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/"},"author":{"name":"April Miller","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/c7f4755d0e529d10f4fe5a5c85be9283"},"headline":"5 Ways to Avoid an Infected USB Drive","datePublished":"2023-01-25T10:01:01+00:00","dateModified":"2023-03-13T10:10:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/"},"wordCount":840,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg","keywords":["Flash Drives","Gadget Security and Privacy"],"articleSection":["Gadgets"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/","url":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/","name":"5 Ways to Avoid an Infected USB Drive - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#primaryimage"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg","datePublished":"2023-01-25T10:01:01+00:00","dateModified":"2023-03-13T10:10:22+00:00","description":"USB drives are a simple and convenient way to move files between devices, but they can pose risks. Unlike email-delivered viruses, where you typically","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#primaryimage","url":"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg","contentUrl":"https:\/\/assets.hongkiat.com\/uploads\/avoid-infected-usb-drives\/unknown-usb.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/avoid-infected-usb-drives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Ways to Avoid an Infected USB Drive"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/c7f4755d0e529d10f4fe5a5c85be9283","name":"April Miller","description":"April is a professional senior writer at ReHack.com with a passion for all things tech related. She specializes in AI, cybersecurity, tech efficiency, and big data; while also writing on various other modern topics across the technology realm. You can find more of her work on ReHack.com or by following her on LinkedIn.","sameAs":["https:\/\/rehack.com\/","https:\/\/www.linkedin.com\/in\/april-j-miller\/","https:\/\/x.com\/rehackmagazine"],"url":"https:\/\/www.hongkiat.com\/blog\/author\/aprilmiller\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-gOe","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/64618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/622"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=64618"}],"version-history":[{"count":2,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/64618\/revisions"}],"predecessor-version":[{"id":65170,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/64618\/revisions\/65170"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=64618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=64618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=64618"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=64618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}