{"id":2011,"date":"2022-09-01T01:57:18","date_gmt":"2022-09-01T01:57:18","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=2011"},"modified":"2022-09-01T08:41:47","modified_gmt":"2022-09-01T08:41:47","slug":"what-is-a-chatbot","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/","title":{"rendered":"What are Chatbot?"},"content":{"rendered":"<h2>What is a Chatbot and How do Chatbots Work?<\/h2>\n<p>A chatbot is a computer program designed to mimic the conversation of a human being via text or voice messages. You can command or ask a question to the chatbot, and the chatbot will respond or perform the requested action.<\/p>\n<p>Chatbot mimics human conversations with the help of artificial intelligence (AI) techniques such as Natural Language Processing (NLP), image and, audio and video analysis. One of the most exciting <strong>features of a chatbot<\/strong> is that it learns from mistakes (past interactions) and becomes intelligent and smarter over time and known as Smart Bot or AI Bot.<\/p>\n<h2>Chatbot Example<\/h2>\n<p>Chatbots come in various shapes and sizes. Some businesses are using chatbots in exciting ways.<\/p>\n<p>Chatbots are used to order food, book flights, and get advice for pretty much anything. Though we are still in the early days of chatbot development, all the latest chatbot statistics indicate one thing: <strong>chatbot adoption<\/strong> is growing among businesses of all sizes.<\/p>\n<p><strong>Starbucks Chatbot:<\/strong> With the help of a chatbot, Starbucks makes the entire process of ordering your favorite drink or snack, a breeze. You just have to order food by using voice commands or text messages and the chatbot will inform you when the order will be ready and the total order amount.<\/p>\n<h2>Chatbot Security Risks<\/h2>\n<h3>Chatbot Security Threats and Concerns<\/h3>\n<p>Chatbots are quickly becoming a norm among businesses to interact with customers. Many companies have already been  using or are at the initial stages of deploying chatbots. Although chatbots offer numerous benefits to businesses and customers, there are several <a href=\"https:\/\/hackercombat.com\/5-mobile-security-threats-cautious-2018\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">security threats <\/a>associated with the use of chatbots.<\/p>\n<p>We are at the nascent stage of chatbot development, current <strong>chatbot solutions<\/strong> are not entirely secure and could expose the business to various cyber attacks. The vulnerabilities present in chatbots provide hackers direct access to an organization&#8217;s network, applications, and databases.<\/p>\n<p>In due course of time, chatbots will eventually mature, and learn to collect more sensitive and personal information through Artificial Intelligence and machine learning capabilities. Hence, it is crucial for any business to enhance the security of its chatbot platform at the foundation level itself.<\/p>\n<p>It is especially critical for businesses to educate themselves and be aware of the risks associated with the use of chatbots. They must consider vital factors such as sharing and storing the information, and most importantly who can access it.<\/p>\n<h2>What Happens When Hackers Attack Chatbots?<\/h2>\n<p>With advances in security solutions, attacking server infrastructure is not an easy task. Thus, hackers are now turning to attack chatbots (as a proxy). Since <strong>chatbots<\/strong> exhibit human-like communication, they can be an excellent proxy for carrying out cyber attacks that defraud victims for hacker profit, or just for fun and amusement.<\/p>\n<p>Hackers can attack a chatbot and turn it into an \u00e2\u20ac\u02dc<strong>evil bot<\/strong>.\u00e2\u20ac\u2122 The ultimate goal would be to scan the other bots in the network for possible vulnerabilities that could later be exploited. Once the bot service or framework protecting the user data gets compromised, it could lead to data theft.<\/p>\n<p>In extreme cases, an \u00e2\u20ac\u02dcevil bot\u00e2\u20ac\u2122 could attempt to masquerade as a legitimate human user and gain access to another user\u00e2\u20ac\u2122s data through a bot that provides such services. For that, it might use the accumulated data about a targeted victim, taken from public sources (such as social media), the dark web (using auctioned passwords or personal information), or both.<\/p>\n<h2>How To Protect Chatbot Data And User Privacy<\/h2>\n<p><strong>Chatbot Protection<\/strong> &#8211; Chatbots and the data that it handles can be secured using technologies such as Two Factor Authentication (2FA), behavior analytics, biometrics and Artificial Intelligence (AI). These newer technologies address the issues of authentication and encryption that affect chatbots.<\/p>\n<p>Chatbots offer businesses massive potential for sales, marketing, and customer service. Thus it is critical for businesses to address any security vulnerabilities by applying the technologies mentioned above.<\/p>\n<p>Another way to secure chatbots and prevent hacking attempts is by using self-destructing messages. This is a proven solution, usually used by banking and all kind of financial chatbots.<\/p>\n<h2>Prevent against Chatbot Vulnerabilities<\/h2>\n<p>When sensitive data is sent through a <strong>chatbot<\/strong>, it can delete that confidential message forever from the system after a specific period of time. This way, the chatbot, user, and the company that uses the chatbot can be sure that all the data and information will be secured and untracked.<\/p>\n<p>Apart from all the tips mentioned above, an excellent <a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">website security<\/a> solution such as Comodo cWatch, the chatbot security provider will offer complete protection to all the websites.<\/p>\n<p>Comodo cWatch is the best website security software to <a href=\"https:\/\/cwatch.comodo.com\/sitescanner\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>scan a website for malware<\/strong><\/a> website security. It can check your website for malware and remove threats within minutes. With its powerful cloud-based <a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener noreferrer\">malware scanning<\/a>, Comodo cWatch can contain even the potent security threats to your site. Try cWatch today!<\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/onboard-buyer-journey\/?track=9679&#038;af=9679\" onclick=\"ga('send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'What is Web Security?'});ga('nT.send', 'event', { eventCategory: 'Cwatch Blog', eventAction: 'Click', eventLabel: 'What is Web Security?'});\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" alt=\"website-security\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" style=\"float:left\" \/><\/a><\/p>\n<div class=\"clearfix\"> <\/div>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-malware-removal.php\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>Website Malware Removal<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/10-common-web-application-security-mistakes\"><strong>10 Common Web Application Security mistakes<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/how-to-check-if-your-site-is-blacklisted\/\"><strong>How to Check if Your Site is Blacklisted<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\"><strong>WordPress Security<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cheap-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Cheap CDN Service<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/best-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best CDN Providers<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/pay-as-you-go-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pay as You Go CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/free-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free Website Hosting<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Vulnerability Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.itarian.com\/remote-desktop-connection-manager.php\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>Remote Desktop Connection Manager<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/how-to-check-if-a-website-is-safe.php\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>Secure my Website<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Checker<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/top-10-vulnerability-assessment-scanning-tools\/\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>Vulnerability Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-security.php\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>Website Security<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a Chatbot and How do Chatbots Work? A chatbot is a computer program designed to mimic the conversation of a human being via text or voice messages. You can command or ask a question to the chatbot, and the chatbot will respond or perform the requested action. Chatbot mimics human conversations with the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[272],"class_list":["post-2011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","tag-chatbots"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are chatbot? | Prevent Chatbot Vulnerabilities<\/title>\n<meta name=\"description\" content=\"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are chatbot? | Prevent Chatbot Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-01T01:57:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-01T08:41:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png\" \/>\n\t<meta property=\"og:image:width\" content=\"906\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"What are Chatbot?\",\"datePublished\":\"2022-09-01T01:57:18+00:00\",\"dateModified\":\"2022-09-01T08:41:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\"},\"wordCount\":861,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png\",\"keywords\":[\"chatbots\"],\"articleSection\":[\"Cyber Attack\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\",\"name\":\"What are chatbot? | Prevent Chatbot Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png\",\"datePublished\":\"2022-09-01T01:57:18+00:00\",\"dateModified\":\"2022-09-01T08:41:47+00:00\",\"description\":\"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png\",\"width\":906,\"height\":600,\"caption\":\"What are chatbots\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are Chatbot?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are chatbot? | Prevent Chatbot Vulnerabilities","description":"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/","og_locale":"en_US","og_type":"article","og_title":"What are chatbot? | Prevent Chatbot Vulnerabilities","og_description":"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.","og_url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/","og_site_name":"cWatch Blog","article_published_time":"2022-09-01T01:57:18+00:00","article_modified_time":"2022-09-01T08:41:47+00:00","og_image":[{"width":906,"height":600,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"What are Chatbot?","datePublished":"2022-09-01T01:57:18+00:00","dateModified":"2022-09-01T08:41:47+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/"},"wordCount":861,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png","keywords":["chatbots"],"articleSection":["Cyber Attack"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/","url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/","name":"What are chatbot? | Prevent Chatbot Vulnerabilities","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png","datePublished":"2022-09-01T01:57:18+00:00","dateModified":"2022-09-01T08:41:47+00:00","description":"What are chatbots? - It\u2019s a program or AI bot that typically conducts a conversation via textual methods. Try cWatch protection to fix chatbot security risks.","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/chat-bot.png","width":906,"height":600,"caption":"What are chatbots"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-a-chatbot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are Chatbot?"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=2011"}],"version-history":[{"count":27,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2011\/revisions"}],"predecessor-version":[{"id":18262,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/2011\/revisions\/18262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/2031"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=2011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=2011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=2011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}