{"id":82943,"date":"2021-02-06T20:24:48","date_gmt":"2021-02-06T09:24:48","guid":{"rendered":"http:\/\/itt.com.au\/?p=82943"},"modified":"2021-02-06T20:24:48","modified_gmt":"2021-02-06T09:24:48","slug":"security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses","status":"publish","type":"post","link":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/","title":{"rendered":"Security flaw could allow hackers to trick lab scientists into making viruses"},"content":{"rendered":"\n

Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.<\/p>\n\n\n\n

The setup<\/strong>: Medical professionals use synthetic DNA for a variety of reasons, including the development of immunogens for creating vaccines. The researchers developed and tested an end-to-end attack that changes data on a bioengineer\u2019s computer in order to replace short DNA sub-strings with malicious code.<\/p>\n\n\n\n

If terrorists wanted to spread a virus or toxin by hijacking a reputable lab or hiding it inside of a vaccine or other medical treatment, they\u2019d traditionally need physical access to the laboratory or part of its supply chain. According to this paper<\/a> published last week in Nature Biotechnology, that\u2019s no longer the case.<\/p>\n\n\n\n

The researchers claim that a simple trojan horse and a bit of hidden code could turn medicine into malice and the engineers creating the tainted goods would be none the wiser:<\/p>\n\n\n\n

A cyberattack intervening with synthetic DNA orders could lead to the synthesis of nucleic acids encoding parts of pathogenic organisms or harmful proteins and toxin\u2026This threat is real. We conducted a proof of concept: An obfuscated DNA encoding a toxic peptide was not detected by software implementing the screening guidelines. The respective order was moved to production.<\/p><\/blockquote>\n\n\n\n

The researchers describe a scenario wherein a bad guy uses a Trojan horse to infect a researcher\u2019s computer. When that researcher goes to order synthetic DNA, the malware obfuscates the order so that it looks legit to the security software the DNA shop uses to check it. In reality, the obfuscated DNA sub-strings are harmful.<\/p>\n\n\n\n

The DNA shop fills the order (unknowingly sending the researcher the dangerous DNA) and the researcher\u2019s security software fails to uncover the obfuscated sub-strings so the researcher remains clueless.<\/p>\n\n\n\n

The researchers managed to use their technique to successfully bypass security for 16 out of the 50 orders they tried it on.<\/p>\n\n\n\n

\"\"<\/figure><\/div>\n\n\n\n

What this means<\/strong>: We\u2019re in a dangerous in-between place where AI isn\u2019t advanced enough yet to detect these kinds of adapted envelope attacks, and humans simply can\u2019t pay enough attention at scale.<\/p>\n\n\n\n

DNA replication services synthesise DNA in numbers so great it would be impossible for humans to check each sequence. We rely on automation and AI to make sure everything is as it should be, but when anomalies show up the machines turn to humans to make the call. In this case, humans likely wouldn\u2019t be able to see through the smokescreen either.<\/p>\n\n\n\n

To address the issue, the researchers suggest a suite of cybersecurity measures they claim should be immediately implemented across the biotechnology community. You can read the entire paper here<\/a>.<\/p>\n \t \t","protected":false},"excerpt":{"rendered":"

<\/p>\n","protected":false},"author":1,"featured_media":82945,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[6,7],"tags":[4],"yoast_head":"\nSecurity flaw could allow hackers to trick lab scientists into making viruses<\/title>\n<meta name=\"description\" content=\"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security flaw could allow hackers to trick lab scientists into making viruses\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\" \/>\n<meta property=\"og:site_name\" content=\"IT&T | Business IT Services and Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-06T09:24:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"itt-admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:site\" content=\"@ITT2500\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itt-admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\"},\"author\":{\"name\":\"itt-admin\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\"},\"headline\":\"Security flaw could allow hackers to trick lab scientists into making viruses\",\"datePublished\":\"2021-02-06T09:24:48+00:00\",\"dateModified\":\"2021-02-06T09:24:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\"},\"wordCount\":460,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg\",\"keywords\":[\"Blog\"],\"articleSection\":[\"Network\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\",\"url\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\",\"name\":\"Security flaw could allow hackers to trick lab scientists into making viruses\",\"isPartOf\":{\"@id\":\"https:\/\/itt.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg\",\"datePublished\":\"2021-02-06T09:24:48+00:00\",\"dateModified\":\"2021-02-06T09:24:48+00:00\",\"description\":\"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.\",\"breadcrumb\":{\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg\",\"width\":730,\"height\":365,\"caption\":\"HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itt.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security flaw could allow hackers to trick lab scientists into making viruses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itt.com.au\/#website\",\"url\":\"https:\/\/itt.com.au\/\",\"name\":\"IT&T | Business IT Services and Solutions\",\"description\":\"The better solution\",\"publisher\":{\"@id\":\"https:\/\/itt.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itt.com.au\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itt.com.au\/#organization\",\"name\":\"IT&T | Business IT Services and Solutions\",\"url\":\"https:\/\/itt.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"contentUrl\":\"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg\",\"width\":1,\"height\":1,\"caption\":\"IT&T | Business IT Services and Solutions\"},\"image\":{\"@id\":\"https:\/\/itt.com.au\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213\",\"https:\/\/x.com\/ITT2500\",\"https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q\",\"https:\/\/www.instagram.com\/itt_wollongong\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1\",\"name\":\"itt-admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itt.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g\",\"caption\":\"itt-admin\"},\"sameAs\":[\"https:\/\/itt.com.au\"],\"url\":\"https:\/\/itt.com.au\/author\/itt-admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security flaw could allow hackers to trick lab scientists into making viruses","description":"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/","og_locale":"en_US","og_type":"article","og_title":"Security flaw could allow hackers to trick lab scientists into making viruses","og_description":"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.","og_url":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/","og_site_name":"IT&T | Business IT Services and Solutions","article_publisher":"https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","article_published_time":"2021-02-06T09:24:48+00:00","og_image":[{"width":730,"height":365,"url":"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg","type":"image\/jpeg"}],"author":"itt-admin","twitter_card":"summary_large_image","twitter_creator":"@ITT2500","twitter_site":"@ITT2500","twitter_misc":{"Written by":"itt-admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#article","isPartOf":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/"},"author":{"name":"itt-admin","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1"},"headline":"Security flaw could allow hackers to trick lab scientists into making viruses","datePublished":"2021-02-06T09:24:48+00:00","dateModified":"2021-02-06T09:24:48+00:00","mainEntityOfPage":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/"},"wordCount":460,"commentCount":0,"publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"image":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg","keywords":["Blog"],"articleSection":["Network","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/","url":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/","name":"Security flaw could allow hackers to trick lab scientists into making viruses","isPartOf":{"@id":"https:\/\/itt.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage"},"image":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage"},"thumbnailUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg","datePublished":"2021-02-06T09:24:48+00:00","dateModified":"2021-02-06T09:24:48+00:00","description":"Cybersecurity researchers recently discovered a computer attack that could allow hackers to remotely trick laboratory scientists into creating toxins and viruses.","breadcrumb":{"@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#primaryimage","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2021\/02\/HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP.jpg","width":730,"height":365,"caption":"HEA_Security_flaw_could_allow_hackers_to_trick_lab_scientists_LP"},{"@type":"BreadcrumbList","@id":"https:\/\/itt.com.au\/security-flaw-could-allow-hackers-to-trick-lab-scientists-into-making-viruses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itt.com.au\/"},{"@type":"ListItem","position":2,"name":"Security flaw could allow hackers to trick lab scientists into making viruses"}]},{"@type":"WebSite","@id":"https:\/\/itt.com.au\/#website","url":"https:\/\/itt.com.au\/","name":"IT&T | Business IT Services and Solutions","description":"The better solution","publisher":{"@id":"https:\/\/itt.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itt.com.au\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itt.com.au\/#organization","name":"IT&T | Business IT Services and Solutions","url":"https:\/\/itt.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","contentUrl":"https:\/\/itt.com.au\/wp-content\/uploads\/2023\/05\/Logo-itt.svg","width":1,"height":1,"caption":"IT&T | Business IT Services and Solutions"},"image":{"@id":"https:\/\/itt.com.au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/ITT-Pty-Ltd\/268794825213","https:\/\/x.com\/ITT2500","https:\/\/www.youtube.com\/channel\/UCdEqeP6rJVRssjnv1HWig2Q","https:\/\/www.instagram.com\/itt_wollongong\/"]},{"@type":"Person","@id":"https:\/\/itt.com.au\/#\/schema\/person\/7c217fee9a41c7ae0fbbac51d10cdab1","name":"itt-admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itt.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0e210a3f1f5cf1082adab126cc1a9e4a?s=96&d=mm&r=g","caption":"itt-admin"},"sameAs":["https:\/\/itt.com.au"],"url":"https:\/\/itt.com.au\/author\/itt-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/82943"}],"collection":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/comments?post=82943"}],"version-history":[{"count":0,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/posts\/82943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media\/82945"}],"wp:attachment":[{"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/media?parent=82943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/categories?post=82943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itt.com.au\/wp-json\/wp\/v2\/tags?post=82943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}