{"id":61463,"date":"2025-12-24T10:32:56","date_gmt":"2025-12-24T05:02:56","guid":{"rendered":"https:\/\/www.techjockey.com\/blog\/?p=61463"},"modified":"2025-12-24T10:33:04","modified_gmt":"2025-12-24T05:03:04","slug":"quishing-attack-qr-code-phishing","status":"publish","type":"post","link":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing","title":{"rendered":"Quishing Attack Explained: The QR Code Scam You Must Avoid!"},"content":{"rendered":"\n

From restaurant menus to parking meters; from delivery labels to payment counters; from conference check-ins to office doors, QR codes are everywhere today. Their widespread take-up is, in part, due to their seemingly harmless outlook and ease-of-use. All you need to do is to point your phone at them, scan, and tap.<\/p>\n\n\n\n

This simple habit is exactly what cybercriminals are turning into a new kind of phishing trap, commonly called the quishing attack. If your team, your customers, or even your family use QR codes regularly, quishing should be on your radar.<\/p>\n\n\n\n

Let\u2019s learn about it in detail, so you know what it is and how to stay safe, one cybersecurity solution<\/a> at a time.<\/p>\n\n\n\n

\"\"<\/figure>\n\n\n\n

<\/span>What is a Quishing Attack?<\/span><\/h2>\n\n\n\n

A quishing attack is a type of phishing scam<\/a> that makes use of QR codes instead of clickable links in emails or text messages to trick people. The term quishing itself is an amalgam<\/strong> of \u2018QR\u2019 and \u2018phishing\u2019.<\/p>\n\n\n\n

Rather than sending a suspicious link that users might recognize and avoid, attackers embed the malicious link within a QR code. When the victim scans the code, their device opens a fraudulent website that is designed to steal sensitive information such as login credentials, payment details, or even install malware.<\/p>\n\n\n\n

In some cases, it can trigger unauthorized actions like sending messages or approving transactions. This QR code scam is the same old phishing tactic, but this time disguised as a black-and-white square.<\/p>\n\n\n\n

The danger lies in the fact that people often choose to ignore or verify URLs on desktops, but this habit often disappears when dealing with QR codes, making them a weapon for cybercriminals.<\/p>\n\n\n\n

Suggested Read: What is Smishing?<\/a><\/strong><\/p>\n\n\n\n

<\/span>How Does a Quishing Attack Work?<\/span><\/h2>\n\n\n\n

Most quishing attacks follow a familiar pattern, just with a QR code in the middle.<\/p>\n\n\n\n

<\/span>Step 1: Get your attention<\/strong><\/span><\/h3>\n\n\n\n

A quishing attack starts with something that looks completely normal. It could be a work email from IT support, a delivery note on your door, or even a printed sign near a payment kiosk.<\/p>\n\n\n\n

Somewhere on it, there\u2019s a QR code and a message that sounds normal, like \u2018Scan to verify your account\u2019, \u2018Scan to appeal this fine\u2019, or \u2018Scan to access Wi-Fi’. These messages are designed to make you act quickly without thinking.<\/p>\n\n\n\n

<\/span>Step 2: You use your phone camera<\/strong><\/span><\/h3>\n\n\n\n

Because QR codes feel official, you trust them. You open your phone camera and scan the code. Instantly, your phone opens a browser page, and you assume everything is fine.<\/p>\n\n\n\n

<\/span>Step 3: Fake site<\/strong><\/span><\/h3>\n\n\n\n

The page you land on looks just like something you know, maybe Microsoft 365, Google, your bank, a payment portal, or your company\u2019s VPN login page. This familiar design is intentional. It lowers your guard and makes you believe the site is real.<\/p>\n\n\n\n

<\/span>Step 4: You enter details<\/strong><\/span><\/h3>\n\n\n\n

Next, you enter your details, such as your username, password, card number, or OTP. The attacker collects this information immediately. In some cases, the fake site even redirects you to the real one afterward, so you don\u2019t suspect anything unusual.<\/p>\n\n\n\n

<\/span>Step 5: Attackers use your access<\/strong><\/span><\/h3>\n\n\n\n

Once they have your details, attackers can log into your accounts, reset passwords, move money, send more QR scams using your identity, or even break into company systems. From your point of view, you only scanned a QR code and logged in as usual. From their point of view, that little square just did all the work.<\/p>\n\n\n\n

Suggested Read: What is Vishing and Why It Matters?<\/a><\/strong><\/p>\n\n\n\n

<\/span>How are QR Code Scams Carried Out?<\/span><\/h2>\n\n\n\n

Attackers use both digital and physical channels to launch a quishing attack. This mix makes them hard to spot and easier to trust.<\/p>\n\n\n\n

<\/span>1. Email-based Quishing<\/span><\/h3>\n\n\n\n

One of the most common methods is through email. You might receive a message warning about a blocked account, expired password, or missed payment. Instead of a clickable link, the email contains an image of a QR code with instructions like \u2018Scan this QR code with your phone to secure your account\u2019.<\/p>\n\n\n\n

Attackers use images because email security tools often scan links, and hiding the phishing link inside a QR code can bypass those filters more easily than a plain text URL.<\/p>\n\n\n\n

<\/span>2. Printed QR Code Scams<\/span><\/h3>\n\n\n\n

This approach is even sneakier. Attackers place fake QR code stickers over real ones in public places such as parking meters, restaurant tables, EV charging stations, or event posters.<\/p>\n\n\n\n

You think you are paying for parking or checking a menu, but instead, you land on a phishing page or a fake payment site. These scams work because they appear in places you already trust, and scanning QR codes in these settings feels normal, so you rarely question the source.<\/p>\n\n\n\n

<\/span>3. Smishing (SMS) With QR Codes<\/span><\/h3>\n\n\n\n

Some scams arrive via text messages. You might see messages like \u2018Your package is waiting. Scan this QR code to complete delivery\u2019 or \u2018Your bank account is locked. Scan to restore access\u2019. When you scan the code, you are taken to a fake login or payment page designed to steal your details.<\/p>\n\n\n\n

<\/span>4. Workplace & Business Scams<\/span><\/h3>\n\n\n\n

Employees are frequent targets because attackers know they are under time pressure and may scan quickly. Common examples include fake IT support notices asking staff to scan a QR code to reset VPN credentials, fake HR or payroll messages requesting scans to view tax forms, and even fake meeting invites with QR codes for \u2018secure access\u2019.<\/p>\n\n\n\n

<\/span>Common Targets of Quishing Attacks<\/span><\/h2>\n\n\n\n

While anyone can fall for QR scams, some groups are targeted more often. Employees and corporate accounts, for instance, are their prime targets because attacking them gives them access to confidential files, emails, and internal tools. They also get to reuse passwords and impersonate staff, especially remote workers who rely on QR codes for Wi-Fi and event check-ins.<\/p>\n\n\n\n

Small and mid-sized businesses are also vulnerable since they often lack full-time security teams yet handle sensitive data, making finance staff, owners, and front-desk employees easy marks for fake invoices or bank notices.<\/p>\n\n\n\n

Consumers paying via QR codes face risks from fraudulent charity posters, tip jars, and \u2018scan-to-pay’ signs at restaurants or parking lots, particularly when rushed or distracted.<\/p>\n\n\n\n

Students and younger users scanning codes for classes or campus events, too, are easily tricked by fake scholarship emails or job flyers, often skipping checks on where the QR leads.<\/p>\n\n\n\n

Suggested Read: Phishing vs Vishing vs Smishing \u2013 Detailed Comparison<\/a><\/strong><\/p>\n\n\n\n

<\/span>How to Know If You are Becoming a Victim of Quishing?<\/span><\/h2>\n\n\n\n

Not every QR code is dangerous, but it is important to recognize when something feels off. One major warning sign is pressure and urgency, messages that push you to act fast, like \u2018Scan now or your account will be closed\u2019 or \u2018Immediate action required\u2019, are designed to stop you from thinking.<\/p>\n\n\n\n

Another red flag is requests for sensitive data. If scanning a QR code takes you to a login page or asks for your bank details, Social Security number, or payment approval, it is likely a scam.<\/p>\n\n\n\n

Always check the website URL after scanning. Look for odd spellings, random domains, or unusual country codes that don\u2019t match the business name. Physical QR codes can also be suspicious if they look out of place, such as crooked stickers, peeling labels, or codes covering official signs.<\/p>\n\n\n\n

Finally, consider the source. If the QR code comes from an unexpected email, text, or unknown sender, or asks you to do something unusual, treat it as suspicious.<\/p>\n\n\n\n

<\/span>Preventive Measures Against Quishing<\/span><\/h2>\n\n\n\n

You don\u2019t need to be a security expert to stay ahead of quishing attacks. A few habits go a long way\u2026<\/p>\n\n\n\n

1. Treat QR Codes Like Links<\/strong><\/p>\n\n\n\n

Every QR code is just a link in disguise. Before you open it, check the URL that appears on your phone\u2019s screen when you scan. Both iPhone and Android show the link at the top or bottom. Pause and read it carefully.<\/p>\n\n\n\n

If the address looks strange or doesn\u2019t match the business name, don\u2019t tap. Make this a habit, especially for QR codes related to payments, banking, or logins.<\/p>\n\n\n\n

2. Type Sensitive Sites Manually<\/strong><\/p>\n\n\n\n

For important sites like online banking, corporate email or VPN, payroll portals, or government websites, avoid scanning QR codes from emails, flyers, or text messages. Instead, type the web address directly into your browser. This simple step helps you bypass fake links hidden behind QR codes.<\/p>\n\n\n\n

3. Verify Physical QR Codes<\/strong><\/p>\n\n\n\n

When scanning printed or posted QR codes, take a moment to check if a sticker has been placed over another code. If you are unsure, ask staff whether the payment or menu QR code is official. If in doubt, request a manual payment option or a printed menu. Many businesses are aware of QR-based fraud and will understand if you ask.<\/p>\n\n\n\n

4. Use Security Tools on Your Phone<\/strong><\/p>\n\n\n\n

While no tool catches everything, enabling safe browsing features on your phone can help. You can also make use of a mobile security software solution<\/a> that checks URLs against known malicious sites.<\/p>\n\n\n\n

Don\u2019t forget to keep your phone\u2019s operating system<\/a> and browser updated so threats are blocked faster. These steps, when combined together, can prevent some QR scams before they fully load.<\/p>\n\n\n\n

5. Train Employees & Set Clear Rules<\/strong><\/p>\n\n\n\n

For businesses, protecting against quishing attacks requires both technology and awareness. Conducting short training sessions to explain QR phishing risks can help. You can also set internal rules stating that IT, HR, or finance will never ask for passwords or MFA codes via QR scans.<\/p>\n\n\n\n

Companies can also provide clear guidance on how to verify any email or flyer with a QR code. Basically, encouraging a culture where employees feel safe asking, \u2018This QR looks odd, can someone check?\u2019<\/p>\n\n\n\n

6. Lock Down Official QR Usage<\/strong><\/p>\n\n\n\n

If your company makes use of QR codes for marketing, events, product packaging, or guest Wi-Fi, take precautions. Only use domains you control and keep them consistent. Also, educate customers and staff about what official QR codes look like and where they appear.<\/p>\n\n\n\n

7. Encourage Reporting & Quick action<\/strong><\/p>\n\n\n\n

If someone comes across a suspicious QR code or falls for one, ask them to immediately report it to the IT or security teams. Reset passwords and check for unusual account activity. If, God forbid, money was involved, contact the bank or card issuer quickly to raise dispute for unauthorized transactions. Remember only fast reporting can limit damage and help others from falling into the same trap.<\/p>\n\n\n\n

Conclusion<\/strong><\/p>\n\n\n\n

Quishing attacks, all in all, convert our trust in QR codes into a weapon. The risk thus is real, but so is the road to prevention. All you need to do is to pause and think before you scan any QR code and even if you do, don\u2019t forget to question it if request logins, payments, or personal data is what it asks for.<\/p>\n\n\n\n

By treating fake QR codes with the same caution as links, you can keep most QR phishing attempts at bay way before they start. Taking help from a good cybersecurity solution is another way for you to steer clear of them.<\/p>\n\n\n\n

Just give us, at Techjockey, a call and get the best security solution working for you today itself!<\/p>\n","protected":false},"excerpt":{"rendered":"

From restaurant menus to parking meters; from delivery labels to payment counters; from conference check-ins to office doors, QR codes are everywhere today. Their widespread take-up is, in part, due to their seemingly harmless outlook and ease-of-use. All you need to do is to point your phone at them, scan, and tap. This simple habit […]<\/p>\n","protected":false},"author":212,"featured_media":61537,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9173],"tags":[],"acf":[],"yoast_head":"\nQuishing Attack Explained: QR Code Phishing Risks & Prevention<\/title>\n<meta name=\"description\" content=\"Think QR codes are safe? Discover what a quishing attack is, how it works, and the shocking ways cybercriminals use it to steal your data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quishing Attack Explained: The QR Code Scam You Must Avoid!\" \/>\n<meta property=\"og:description\" content=\"Think QR codes are safe? Discover what a quishing attack is, how it works, and the shocking ways cybercriminals use it to steal your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463\" \/>\n<meta property=\"og:site_name\" content=\"Techjockey.com Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Techjockey\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-24T05:02:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-24T05:03:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Yashika Aneja\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:site\" content=\"@TechJockeys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yashika Aneja\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quishing Attack Explained: QR Code Phishing Risks & Prevention","description":"Think QR codes are safe? Discover what a quishing attack is, how it works, and the shocking ways cybercriminals use it to steal your data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463","og_locale":"en_US","og_type":"article","og_title":"Quishing Attack Explained: The QR Code Scam You Must Avoid!","og_description":"Think QR codes are safe? Discover what a quishing attack is, how it works, and the shocking ways cybercriminals use it to steal your data.","og_url":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463","og_site_name":"Techjockey.com Blog","article_publisher":"https:\/\/www.facebook.com\/Techjockey\/","article_published_time":"2025-12-24T05:02:56+00:00","article_modified_time":"2025-12-24T05:03:04+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png","type":"image\/png"}],"author":"Yashika Aneja","twitter_card":"summary_large_image","twitter_creator":"@TechJockeys","twitter_site":"@TechJockeys","twitter_misc":{"Written by":"Yashika Aneja","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#article","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing"},"author":{"name":"Yashika Aneja","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/ca1bd133dee12c2231aee1f84f1155a4"},"headline":"Quishing Attack Explained: The QR Code Scam You Must Avoid!","datePublished":"2025-12-24T05:02:56+00:00","dateModified":"2025-12-24T05:03:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing"},"wordCount":1854,"publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png","articleSection":["Cyber Security Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing","url":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing","name":"Quishing Attack Explained: QR Code Phishing Risks & Prevention","isPartOf":{"@id":"https:\/\/www.techjockey.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#primaryimage"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#primaryimage"},"thumbnailUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png","datePublished":"2025-12-24T05:02:56+00:00","dateModified":"2025-12-24T05:03:04+00:00","description":"Think QR codes are safe? Discover what a quishing attack is, how it works, and the shocking ways cybercriminals use it to steal your data.","breadcrumb":{"@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#primaryimage","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2025\/12\/24103208\/Quishing-attack.png","width":1200,"height":628,"caption":"Illustration showing a smartphone scanning a QR code labeled Quishing Attack A Complete Guide, highlighting QR code phishing threats and cybersecurity awareness."},{"@type":"BreadcrumbList","@id":"https:\/\/www.techjockey.com\/blog\/quishing-attack-qr-code-phishing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techjockey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Software","item":"https:\/\/www.techjockey.com\/blog\/category\/security-software"},{"@type":"ListItem","position":3,"name":"Quishing Attack Explained: The QR Code Scam You Must Avoid!"}]},{"@type":"WebSite","@id":"https:\/\/www.techjockey.com\/blog\/#website","url":"https:\/\/www.techjockey.com\/blog\/","name":"Techjockey.com Blog","description":"","publisher":{"@id":"https:\/\/www.techjockey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techjockey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techjockey.com\/blog\/#organization","name":"Techjockey Infotech Private Limited","url":"https:\/\/www.techjockey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","contentUrl":"https:\/\/cdn.techjockey.com\/blog\/wp-content\/uploads\/2019\/12\/logo.png","width":72,"height":72,"caption":"Techjockey Infotech Private Limited"},"image":{"@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Techjockey\/","https:\/\/twitter.com\/TechJockeys","https:\/\/www.linkedin.com\/company\/techjockey","https:\/\/www.youtube.com\/@techjockeydotcom"]},{"@type":"Person","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/ca1bd133dee12c2231aee1f84f1155a4","name":"Yashika Aneja","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techjockey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6272a4996cf1180ebfe2b7892148c785?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6272a4996cf1180ebfe2b7892148c785?s=96&d=mm&r=g","caption":"Yashika Aneja"},"description":"Yashika Aneja is a Senior Content Writer at Techjockey, with over 5 years of experience in content creation and management. From writing about normal everyday affairs to profound fact-based stories on wide-ranging themes, including environment, technology, education, politics, social media, travel, lifestyle so on and so forth, she has, as part of her professional journey so far, shown acute proficiency in almost all sorts of genres\/formats\/styles of writing. With perpetual curiosity and enthusiasm to delve into the new and the uncharted, she is thusly always at the top of her lexical game, one priceless word at a time.","sameAs":["http:\/\/linkedin.com\/in\/yashika-aneja-a47799183"],"birthDate":"1996-04-09","gender":"Female","knowsLanguage":["English","Hindi","Punjabi"],"jobTitle":"Senior Content Writer","worksFor":"Techjockey","url":"https:\/\/www.techjockey.com\/blog\/author\/yashika"}]}},"_links":{"self":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463"}],"collection":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/comments?post=61463"}],"version-history":[{"count":9,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463\/revisions"}],"predecessor-version":[{"id":61538,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/posts\/61463\/revisions\/61538"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media\/61537"}],"wp:attachment":[{"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/media?parent=61463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/categories?post=61463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techjockey.com\/blog\/wp-json\/wp\/v2\/tags?post=61463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}