{"id":24056,"date":"2021-04-13T14:01:12","date_gmt":"2021-04-13T12:01:12","guid":{"rendered":"https:\/\/piekblog.com\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/"},"modified":"2021-04-13T14:01:12","modified_gmt":"2021-04-13T12:01:12","slug":"cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich","status":"publish","type":"post","link":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/","title":{"rendered":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich?"},"content":{"rendered":"<p>Bevor wir uns n\u00e4her mit dem Thema Pr\u00e4vention vor Cyberkriminalit\u00e4t auseinandersetzen, m\u00f6chten wir gerne einige Begriffe festlegen. Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?<\/p>\n<p>Hacker bzw. Hackergruppen entwickeln eine sogenannte Malware zur Verfolgung krimineller Ziele. Das Ziel ist in der Regel das Folgende:<\/p>\n<ul>\n<li>Diebstahl von Zugangscodes f\u00fcr Bankkonten<\/li>\n<li>Anzeige von Werbung auf dem Computer des Opfers<\/li>\n<li>Illegale Verwendung der Systemressourcen des Opfers f\u00fcr die Entwicklung und Ausf\u00fchrung von z.B. Spam-Kampagnen, verteilten Netzwerkangriffen (sogenannte DDoS-Angriffe (= Distributed Denial of Service), Erpressung\u201c etc.<br \/>\n(Quelle: Kaspersky.de)<\/li>\n<\/ul>\n<p>Eine L\u00f6sung scheint naheliegend, denn es gibt Anti-Malware Programme. Das sind Software-Programme, die sch\u00e4dliche Programme erkennen und vernichten. In kostenpflichtigen Versionen bieten sie auch Schutz f\u00fcr die Cloud, Computer und diverse Endger\u00e4te wie Tablets, Telefone u.a. Informiert man sich mithilfe diverser Publikationen wird jedoch klar, dass auch die teuren Komplettpakete keinen 100-prozentigen Schutz bieten. Auch wenn nicht explizit genannt wird warum, liegt die Vermutung nahe das der Zeitaspekt eine Rolle spielt. H\u00e4ufig reagieren die Programme auf bestehende Malware und erkennen durch Hacker neu entwickelte Malware nicht. Trotzdem bieten die Anti-Malware Programme einen \u00e4u\u00dferst wichtigen Beitrag bei der Pr\u00e4vention von Hackerangriffen.<\/p>\n<p>Aus Erfahrung wissen wir, dass die alleinige Anschaffung von Anti-Malware bzw. Anti-Virus Programmen nicht ausreichend ist. Regelm\u00e4\u00dfige Updates vorhandener Programme sind unerl\u00e4sslich, um Systeme zu sch\u00fctzen.<\/p>\n<p>Der Systemschutz ist die eine Sache. Regelm\u00e4\u00dfige Information der Mitarbeiter eine andere. Vor einigen Wochen schickte eine niederl\u00e4ndische Hochschule eine selbst erstellte Phishing Mail an alle Mitarbeiter. Erschreckendes Ergebnis: fast 30% der Mitarbeiter \u00f6ffneten die E-Mail und das, obwohl immer wieder vor Phishing Mails gewarnt wurde. 70% der Mitarbeiter reagierten richtig und leiteten die Mail, wie vorgeschrieben, an die entsprechende Abteilung weiter. Leider war diese Abteilung so \u00fcberlastet, dass entsprechende Ma\u00dfnahmen zu sp\u00e4t eingeleitet wurden.<\/p>\n<p>Fazit: es beginnt und endet bei den Menschen, die an Computern sitzen, WhatsApp Berichte \u00f6ffnen, Bankangelegenheiten Online regeln und auch sonst f\u00fcr (fast) alles moderne Kommunikationsm\u00f6glichkeiten nutzen. Hier kann und muss die Pr\u00e4vention gezielt und insbesondere regelm\u00e4\u00dfig ansetzen. Wenn das Thema Cyberkriminalit\u00e4t in den Mittelpunkt gestellt wird, w\u00e4chst auf Dauer auch das Bewusstsein umsichtig mit jeglicher Online Kommunikation umzugehen.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bevor wir uns n\u00e4her mit dem Thema Pr\u00e4vention vor Cyberkriminalit\u00e4t  [&#8230;]<\/p>\n","protected":false},"author":3,"featured_media":23957,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[340],"class_list":["post-24056","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-piek-de","tag-cybercrime-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK<\/title>\n<meta name=\"description\" content=\"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK\" \/>\n<meta property=\"og:description\" content=\"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/\" \/>\n<meta property=\"og:site_name\" content=\"PIEK\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PiekIEC\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-13T12:01:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"557\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Wendy Wings\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:site\" content=\"@PiekIEC\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Wendy Wings\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/\"},\"author\":{\"name\":\"Wendy Wings\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\"},\"headline\":\"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich?\",\"datePublished\":\"2021-04-13T12:01:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/\"},\"wordCount\":387,\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"keywords\":[\"Cybercrime\"],\"articleSection\":[\"PIEK\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/\",\"name\":\"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"datePublished\":\"2021-04-13T12:01:12+00:00\",\"description\":\"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#primaryimage\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/cyber-attack.jpg\",\"width\":860,\"height\":557,\"caption\":\"Man wearing hoodie hacking server in dark room\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/piekblog.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/piekblog.com\\\/de\\\/\",\"name\":\"PIEK\",\"description\":\"Your knowledge provider for the electronics industry\",\"publisher\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/piekblog.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#organization\",\"name\":\"PIEK International Education Centre (I.E.C.)\",\"url\":\"https:\\\/\\\/piekblog.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"contentUrl\":\"https:\\\/\\\/piekblog.com\\\/wp-content\\\/uploads\\\/PIEK-Logo-2x.png\",\"width\":300,\"height\":120,\"caption\":\"PIEK International Education Centre (I.E.C.)\"},\"image\":{\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/PiekIEC\",\"https:\\\/\\\/x.com\\\/PiekIEC\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/piek-international-education-centre-bv\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PIEKtraining\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/piekblog.com\\\/de\\\/#\\\/schema\\\/person\\\/9c7a67e97b631d3aa79e77246849999e\",\"name\":\"Wendy Wings\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g\",\"caption\":\"Wendy Wings\"},\"url\":\"https:\\\/\\\/piekblog.com\\\/de\\\/author\\\/wendy-wings\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK","description":"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/","og_locale":"de_DE","og_type":"article","og_title":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK","og_description":"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?","og_url":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/","og_site_name":"PIEK","article_publisher":"https:\/\/www.facebook.com\/PiekIEC","article_published_time":"2021-04-13T12:01:12+00:00","og_image":[{"width":860,"height":557,"url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","type":"image\/jpeg"}],"author":"Wendy Wings","twitter_card":"summary_large_image","twitter_creator":"@PiekIEC","twitter_site":"@PiekIEC","twitter_misc":{"Verfasst von":"Wendy Wings","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#article","isPartOf":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/"},"author":{"name":"Wendy Wings","@id":"https:\/\/piekblog.com\/de\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e"},"headline":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich?","datePublished":"2021-04-13T12:01:12+00:00","mainEntityOfPage":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/"},"wordCount":387,"publisher":{"@id":"https:\/\/piekblog.com\/de\/#organization"},"image":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","keywords":["Cybercrime"],"articleSection":["PIEK"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/","url":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/","name":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich? - PIEK","isPartOf":{"@id":"https:\/\/piekblog.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#primaryimage"},"image":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#primaryimage"},"thumbnailUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","datePublished":"2021-04-13T12:01:12+00:00","description":"Wir reden viel \u00fcber Cyberattacken, Sicherheitsl\u00fccken, Datenklau etc., aber was ist nun wirklich gemeint?","breadcrumb":{"@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#primaryimage","url":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/cyber-attack.jpg","width":860,"height":557,"caption":"Man wearing hoodie hacking server in dark room"},{"@type":"BreadcrumbList","@id":"https:\/\/piekblog.com\/de\/cyberkriminalitaet-und-praevention-ein-widerspruch-in-sich\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/piekblog.com\/de\/"},{"@type":"ListItem","position":2,"name":"Cyberkriminalit\u00e4t und Pr\u00e4vention. Ein Widerspruch in sich?"}]},{"@type":"WebSite","@id":"https:\/\/piekblog.com\/de\/#website","url":"https:\/\/piekblog.com\/de\/","name":"PIEK","description":"Your knowledge provider for the electronics industry","publisher":{"@id":"https:\/\/piekblog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/piekblog.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/piekblog.com\/de\/#organization","name":"PIEK International Education Centre (I.E.C.)","url":"https:\/\/piekblog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/piekblog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","contentUrl":"https:\/\/piekblog.com\/wp-content\/uploads\/PIEK-Logo-2x.png","width":300,"height":120,"caption":"PIEK International Education Centre (I.E.C.)"},"image":{"@id":"https:\/\/piekblog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PiekIEC","https:\/\/x.com\/PiekIEC","https:\/\/www.linkedin.com\/company\/piek-international-education-centre-bv","https:\/\/www.youtube.com\/c\/PIEKtraining"]},{"@type":"Person","@id":"https:\/\/piekblog.com\/de\/#\/schema\/person\/9c7a67e97b631d3aa79e77246849999e","name":"Wendy Wings","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/42be4b00ea28a646a55faca54769b5ffd7f21b52929834af05606d5ef5b25bad?s=96&d=mm&r=g","caption":"Wendy Wings"},"url":"https:\/\/piekblog.com\/de\/author\/wendy-wings\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/posts\/24056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/comments?post=24056"}],"version-history":[{"count":0,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/posts\/24056\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/media\/23957"}],"wp:attachment":[{"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/media?parent=24056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/categories?post=24056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/piekblog.com\/de\/wp-json\/wp\/v2\/tags?post=24056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}