{"id":1891,"date":"2022-10-11T23:45:33","date_gmt":"2022-10-11T23:45:33","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=1891"},"modified":"2022-10-11T15:39:53","modified_gmt":"2022-10-11T15:39:53","slug":"csrf-token-and-csrf-attack","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/","title":{"rendered":"CSRF Token And CSRF Attack"},"content":{"rendered":"<h2>What is CSRF Attack?<\/h2>\n<p>Cross-site Request Forgery (CSRF), XSRF, or Sea surf is an attack on authenticated web applications using Cookies that tricks an end user to execute unwanted actions of the attacker&#39;s choosing. The attack is especially aimed at state-changing requests, not theft of data because the attacker will not see the response to the forged request. In another sense, the CSRF attacker exploits the liability of a web application that it has with the victim&#8217;s browser. To accomplish this, a little help from social engineering like sending a link via email or chat is used. In the case of an administrative account, CSRF can compromise the entire web application.<\/p>\n<h2><strong>What is CSRF Token?<\/strong><\/h2>\n<p>In order to stay safe from Cross-site Request Forgery (CSRF) attacks, make use of the suggested and the most widely used prevention techniques which are known as an anti-CSRF tokens, also sometimes referred to as synchronizer tokens.<\/p>\n<p>It is vital to include in the request the anti-CSRF token whenever a user is trying to raise any authenticated request or submit a form that might involve cookies. By doing so, the web application will then confirm the existence and correctness of this token before processing the request. If the token is incorrect or missing, the request can be rejected with ease.<\/p>\n<p>Besides, it is equally important to use an existing, well-tested and secure anti-CSRF library. Based on the framework and language of your choice, many high-quality open-source libraries are ready-to-use.<\/p>\n<p><b>A well designed anti-CSRF system includes the following characteristics:<\/b><\/p>\n<p>    \u00e2\u20ac\u00a2 Each user session should possess a unique anti-CSRF token<\/p>\n<p>    \u00e2\u20ac\u00a2 After the preferred amount of time, the session should expire automatically<\/p>\n<p>    \u00e2\u20ac\u00a2 The anti-CSRF token needs to be cryptographically of random value with significant length and be secure.<br \/>\nIt should be generated by a strong Pseudo-Random Number Generator (PRNG) algorithm.<\/p>\n<p>    \u00e2\u20ac\u00a2 The anti-CSRF token is included as a secret field in the <a href=\"https:\/\/www.formbot.com\/\" rel=\"noopener\" target=\"_blank\">forms<\/a> or within URLs<\/p>\n<p>    \u00e2\u20ac\u00a2 The server will deny the requested action if the anti-CSRF token declines in the validation stage.<\/p>\n<h2>The CSRF Attacks<\/h2>\n<p>The <strong>CSRF attacks<\/strong> can be cannot be identified immediately but can happen only based on these below mentioned three points.<br \/>\n    \u00e2\u20ac\u00a2 The Web developers didn&#39;t take security seriously<\/p>\n<p>    \u00e2\u20ac\u00a2 They opted out of the anti-CSRF token deliberately or by mistake<\/p>\n<p>    \u00e2\u20ac\u00a2 The anti-CSRF token was implemented incorrectly<\/p>\n<h2>The CSRF Prevention<\/h2>\n<p><strong>How to Prevent CSRF Attack?<\/strong><\/p>\n<p>Numerous methods exist for <strong>CSRF attack<\/strong> mitigation and prevention. From a user\u00e2\u20ac\u2122s viewpoint, prevention is the element of safeguarding login credentials and rejecting illegal participants from accessing the applications.<\/p>\n<p><b>The Industry Good Practices Include:<\/b><\/p>\n<p>    \u00e2\u20ac\u00a2 Properly logging out from web applications when not in use<\/p>\n<p>    \u00e2\u20ac\u00a2 Safeguarding usernames and passwords<\/p>\n<p>    \u00e2\u20ac\u00a2 Avoiding web browsers from remembering passwords<\/p>\n<p>    \u00e2\u20ac\u00a2 Avoiding accessing an application and browsing at the same time<\/p>\n<p>In the case of some web applications, few solutions exist to prevent malicious traffic and block attacks. The widely used mitigation methods are to generate unique random tokens for every session. Subsequently, the session request is compared, reviewed, and verified by the server.  The session requests with duplicate tokens or missing values are blocked. On the other hand, a request that doesn\u00e2\u20ac\u2122t match the session ID token is prevented from reaching an application.<\/p>\n<p>Besides, double submission of cookies is another well-known method to block CSRF.  This involves using unique and random tokens that are distributed to both the cookie and the request parameter. The server grants access to the application after verifying these tokens.<\/p>\n<p><strong>Comodo cWatch<\/strong><\/p>\n<p>The Comodo cWatch  is a Complete <a href=\"https:\/\/cwatch.comodo.com\">Website Security Software<\/a> Solution which discovers and continuously monitors all web applications. It also includes malware scanning, detection and removal services to enable organizations to take a proactive approach to protect their businesses and brand reputation from cyber-attacks. For more details visit our official page!<\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/onboard-buyer-journey\/?track=9679&#038;af=9679\" onclick=\"ga('send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'DDoS Attack Prevention Method: A Detailed Report'});ga('nT.send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'DDoS Attack Prevention Method: A Detailed Report'});\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" alt=\"website-security\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" style=\"float:left\" \/><\/a><\/p>\n<div class=\"clearfix\"> <\/div>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Cheap Content Delivery Network<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/best-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best CDN Providers<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free Website Hosting<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener noreferrer\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/five-reasons-why-small-businesses-are-prone-to-malware-attacks\"><strong>Five reasons why small businesses are prone to malware attacks<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/best-website-security-for-enterprise.php\"> <strong>Best Website Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\"> <strong>WordPress Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Status<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is CSRF Attack? Cross-site Request Forgery (CSRF), XSRF, or Sea surf is an attack on authenticated web applications using Cookies that tricks an end user to execute unwanted actions of the attacker&#39;s choosing. The attack is especially aimed at state-changing requests, not theft of data because the attacker will not see the response to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1892,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[1212,1242,1222,1232],"class_list":["post-1891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","tag-csrf-attacks","tag-csrf-prevention","tag-csrf-token","tag-what-is-csrf-token"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are CSRF Token and CSRF attacks? | CSRF Protection<\/title>\n<meta name=\"description\" content=\"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are CSRF Token and CSRF attacks? | CSRF Protection\" \/>\n<meta property=\"og:description\" content=\"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-11T23:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"CSRF Token And CSRF Attack\",\"datePublished\":\"2022-10-11T23:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\"},\"wordCount\":658,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg\",\"keywords\":[\"CSRF Attacks\",\"CSRF Prevention\",\"CSRF Token\",\"What is CSRF Token?\"],\"articleSection\":[\"Cyber Attack\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\",\"name\":\"What are CSRF Token and CSRF attacks? | CSRF Protection\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg\",\"datePublished\":\"2022-10-11T23:45:33+00:00\",\"description\":\"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg\",\"width\":600,\"height\":350,\"caption\":\"What is CSRF Attack?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CSRF Token And CSRF Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are CSRF Token and CSRF attacks? | CSRF Protection","description":"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/","og_locale":"en_US","og_type":"article","og_title":"What are CSRF Token and CSRF attacks? | CSRF Protection","og_description":"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!","og_url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/","og_site_name":"cWatch Blog","article_published_time":"2022-10-11T23:45:33+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"CSRF Token And CSRF Attack","datePublished":"2022-10-11T23:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/"},"wordCount":658,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg","keywords":["CSRF Attacks","CSRF Prevention","CSRF Token","What is CSRF Token?"],"articleSection":["Cyber Attack"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/","url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/","name":"What are CSRF Token and CSRF attacks? | CSRF Protection","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg","datePublished":"2022-10-11T23:45:33+00:00","description":"CSRF Attack - Cross Site Request Forgery Attack. Know what is CSRF tokens and CSRF attacks. Get the CSRF Prevention and mitigation guide from cWatch!","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/csrf-attack.jpg","width":600,"height":350,"caption":"What is CSRF Attack?"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/csrf-token-and-csrf-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CSRF Token And CSRF Attack"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1891"}],"version-history":[{"count":18,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1891\/revisions"}],"predecessor-version":[{"id":19102,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1891\/revisions\/19102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1892"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}