{"id":1707,"date":"2024-04-18T02:58:30","date_gmt":"2024-04-18T02:58:30","guid":{"rendered":"https:\/\/first-unity.com.hk\/?p=1707"},"modified":"2024-04-18T02:58:33","modified_gmt":"2024-04-18T02:58:33","slug":"beware-of-hackers-using-fake-quickbooks-software","status":"publish","type":"post","link":"https:\/\/first-unity.com.hk\/zh\/beware-of-hackers-using-fake-quickbooks-software\/","title":{"rendered":"\u8b39\u9632\u99ed\u5ba2\u4f7f\u7528\u4eff\u5192QuickBooks\u8edf\u9ad4"},"content":{"rendered":"<p>\u5f15\u8a00:<\/p>\n\n\n\n<p>\u99ed\u5ba2\u6b63\u5728\u5229\u7528\u507d\u9020\u7684QuickBooks\u8edf\u9ad4\u6b3a\u9a19\u6beb\u7121\u6212\u5fc3\u7684\u500b\u4eba\u3002 \u9019\u4e00\u4ee4\u4eba\u9707\u9a5a\u7684\u8da8\u52e2\u5f15\u8d77\u4e86\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u7684\u6ce8\u610f\uff0c\u4ed6\u5011\u6566\u4fc3\u7528\u6236\u4fdd\u6301\u8b66\u60d5\uff0c\u63a1\u53d6\u5fc5\u8981\u7684\u9810\u9632\u63aa\u65bd\uff0c\u4fdd\u8b77\u81ea\u5df1\u514d\u53d7\u6b64\u985e\u8a50\u9a19\u3002<\/p>\n\n\n\n<p>\u5047\u5192QuickBooks\u8edf\u9ad4\u7684\u8208\u8d77<\/p>\n\n\n\n<p>\u8a50\u6b3a\u8005\u958b\u767c\u4e86\u5047\u5192\u7684QuickBooks\u5b89\u88dd\u7a0b\u5e8f\uff0c\u9020\u6210\u7528\u6236\u9700\u8981\u6280\u8853\u652f\u63f4\u624d\u80fd\u89e3\u6c7aQuickBooks\u554f\u984c\u7684\u5047\u8c61QuickBooks\u5ee3\u6cdb\u61c9\u7528\u65bc\u91d1\u878d\u696d\uff0c\u56e0\u6b64\u6210\u70ba\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u7684\u76ee\u6a19\u3002 \u9019\u7a2e\u8a50\u6b3a\u884c\u70ba\u662f\u7531\u4e00\u4e9b\u7db2\u8def\u72af\u7f6a\u5206\u5b50\u6240\u5be6\u65bd\u7684\u3002\u4f7f\u7528\u8005\u7121\u610f\u4e2d\u5f9e\u4e00\u500b\u540d\u70ba \"QB Exclusive\"\u7684\u770b\u4f3c\u5408\u6cd5\u7684\u7db2\u7ad9\u4e0a\u4e0b\u8f09\u4e86\u5047\u7684QuickBooks\u8edf\u9ad4\u3002 \u8a72\u7db2\u7ad9\u7531\u4e00\u540d\u64cd\u7e31\u53d7\u5bb3\u8005\u7684\u5a01\u8105\u884c\u70ba\u8005\u63a7\u5236\u3002 \u53d7\u5bb3\u8005\u5831\u544a\u8aaa\uff0c\u4ed6\u5011\u88ab\u8b66\u544a\u8a0a\u606f\u548c800\u7f8e\u5143\u52302000\u7f8e\u5143\u4e0d\u7b49\u7684\u975e\u6cd5\u652f\u6301\u670d\u52d9\u6240\u6b3a\u9a19\u3002\u9a19\u5b50\u5192\u5145QB Exclusive\u4ee3\u7406\uff0c\u8aaa\u670d\u53d7\u5bb3\u8005\u5141\u8a31\u4ed6\u5011\u9060\u7aef\u5b58\u53d6\u7cfb\u7d71\u3002 \u4e00\u65e6\u6388\u4e88\u5b58\u53d6\u6b0a\u9650\uff0c\u9a19\u5b50\u5c31\u6703\u5be6\u65bd\u60e1\u610f\u884c\u70ba\uff0c\u4f8b\u5982\u7aca\u53d6\u6a5f\u5bc6\u8cc7\u6599\u6216\u690d\u5165\u5f8c\u9580\u3002\u7576\u7528\u6236\u641c\u5c0b \"QuickBooks\u4e0b\u8f09 \"\u6642\uff0c\u8a50\u9a19\u96c6\u5718\u6703\u5229\u7528Google\u5ee3\u544a\u5c07\u4f7f\u7528\u8005\u5f15\u5411\u60e1\u610f\u7db2\u7ad9\u3002 \u7528\u6236\u5728\u4e0b\u8f09\u524d\u61c9\u6aa2\u67e5\u8edf\u9ad4\u4f86\u6e90\u7684\u771f\u5be6\u6027\u3002<\/p>\n\n\n\n<p>\u8a50\u9a19\u904e\u7a0b<\/p>\n\n\n\n<p>\u7528\u6236\u5728\u6beb\u4e0d\u77e5\u60c5\u7684\u60c5\u6cc1\u4e0b\uff0c\u5f9e\u4e00\u500b\u770b\u4f3c\u5408\u6cd5\u7684\u7db2\u7ad9\u201cQB Exclusive\u201d\u4e0b\u8f09\u507d\u9020\u7684QuickBooks\u8edf\u9ad4\u3002\u9019\u500b\u7db2\u7ad9\u7531\u5a01\u8105\u884c\u70ba\u8005\u63a7\u5236\uff0c\u4ed6\u5011\u64cd\u7e31\u53d7\u5bb3\u8005\u3002\u53d7\u5bb3\u8005\u5831\u544a\u8aaa\uff0c\u4ed6\u5011\u901a\u904e\u8b66\u544a\u4fe1\u606f\u548c\u975e\u6cd5\u652f\u63f4\u670d\u52d9\u88ab\u8a50\u9a19\uff0c\u50f9\u683c\u7bc4\u570d\u5f9e800\u7f8e\u5143\u52302000\u7f8e\u5143\u3002<\/p>\n\n\n\n<p>\u6b3a\u9a19\u624b\u6bb5<\/p>\n\n\n\n<p>\u8a50\u9a19\u8005\u5047\u5192QB Exclusive\u7684\u4ee3\u8868\uff0c\u8aaa\u670d\u53d7\u5bb3\u8005\u6388\u4e88\u4ed6\u5011\u9060\u7a0b\u8a2a\u554f\u4ed6\u5011\u7cfb\u7d71\u7684\u6b0a\u9650\u3002\u4e00\u65e6\u7372\u5f97\u6b0a\u9650\uff0c\u8a50\u9a19\u8005\u5c31\u53ef\u4ee5\u9032\u884c\u60e1\u610f\u6d3b\u52d5\uff0c\u5982\u7aca\u53d6\u654f\u611f\u6578\u64da\u548c\u690d\u5165\u5f8c\u9580\u3002<\/p>\n\n\n\n<p>Google\u5ee3\u544a\u4f5c\u70ba\u4e00\u500b\u52a9\u624b<\/p>\n\n\n\n<p>\u8a50\u9a19\u8005\u5229\u7528Google\u5ee3\u544a\uff0c\u5c0e\u81f4\u7528\u6236\u5728\u641c\u7d22\u201cQuickBooks\u4e0b\u8f09\u201d\u6642\u88ab\u5f15\u5c0e\u5230\u60e1\u610f\u7db2\u7ad9\u3002\u7528\u6236\u61c9\u8b39\u614e\u884c\u4e8b\uff0c\u4e26\u5728\u4e0b\u8f09\u524d\u9a57\u8b49\u8edf\u9ad4\u4f86\u6e90\u7684\u771f\u5be6\u6027\u3002<\/p>\n\n\n\n<p>\u4fdd\u8b77\u63aa\u65bd\u548c\u5efa\u8b70<\/p>\n\n\n\n<p>\u52a0\u5f37\u9632\u7bc4\u610f\u8b58\u548c\u5b89\u5168\u57f9\u8a13\u5c0d\u65bc\u6253\u64ca\u8a50\u6b3a\u884c\u70ba\u975e\u5e38\u91cd\u8981\u3002 \u6b64\u5916\uff0c\u90e8\u7f72\u7aef\u9ede\u5075\u6e2c\u548c\u56de\u61c9 (EDR) \u8edf\u9ad4\u53ef\u4ee5\u63d0\u4f9b\u984d\u5916\u7684\u4fdd\u8b77\uff0c\u9632\u6b62\u60e1\u610f\u8edf\u9ad4\u3002<\/p>\n\n\n\n<p>\u7d50\u8ad6\uff1a<\/p>\n\n\n\n<p>\u99ed\u5ba2\u4f7f\u7528\u4eff\u5192QuickBooks\u8edf\u9ad4\u662f\u4e00\u500b\u503c\u5f97\u95dc\u6ce8\u7684\u554f\u984c\u3002 \u7528\u6236\u5728\u4e0b\u8f09\u524d\u61c9\u8b39\u614e\u884c\u4e8b\uff0c\u4e26\u6838\u5be6\u8edf\u9ad4\u4f86\u6e90\u7684\u771f\u5be6\u6027\u3002 \u900f\u904e\u53ca\u6642\u66f4\u65b0\u8cc7\u8a0a\u4e26\u63a1\u53d6\u9069\u7576\u7684\u5b89\u5168\u63aa\u65bd\uff0c\u500b\u4eba\u53ef\u4ee5\u4fdd\u8b77\u81ea\u5df1\u514d\u53d7\u6b64\u985e\u8a50\u9a19\uff0c\u4e26\u78ba\u4fdd\u654f\u611f\u8cc7\u8a0a\u7684\u5b89\u5168\u3002 \u5728\u6578\u4f4d\u4e16\u754c\u4e2d\uff0c\u8b93\u6211\u5011\u6642\u6642\u4fdd\u6301\u8b66\u60d5\u3002<\/p>\n\n\n\n<p>\u514d\u8cac\u8072\u660e:<\/p>\n\n\n\n<p>\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u548c\u6559\u80b2\u76ee\u7684\uff0c\u4e26\u4e0d\u69cb\u6210\u5c08\u696d\u5efa\u8b70\u3002\u6211\u5011\u5df2\u7d93\u76e1\u529b\u78ba\u4fdd\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\u6e96\u78ba\u53ef\u9760\uff0c\u4f46\u4e0d\u5c0d\u5176\u5b8c\u6574\u6027\u3001\u6e96\u78ba\u6027\u3001\u53ef\u9760\u6027\u6216\u9069\u7528\u6027\u4f5c\u51fa\u4efb\u4f55\u660e\u793a\u6216\u6697\u793a\u7684\u4fdd\u8b49\u3002\n\u4efb\u4f55\u4f9d\u8cf4\u672c\u535a\u5ba2\u63d0\u4f9b\u7684\u4fe1\u606f\u6240\u5f15\u8d77\u7684\u884c\u52d5\u90fd\u662f\u60a8\u500b\u4eba\u7684\u8cac\u4efb\u3002\u5728\u63a1\u53d6\u4efb\u4f55\u884c\u52d5\u4e4b\u524d\uff0c\u8acb\u8aee\u8a62\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002\n\u6211\u5011\u5c0d\u65bc\u56e0\u4f7f\u7528\u6216\u4f9d\u8cf4\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u800c\u5c0e\u81f4\u7684\u4efb\u4f55\u76f4\u63a5\u6216\u9593\u63a5\u640d\u5931\u6216\u640d\u5bb3\uff0c\u6982\u4e0d\u627f\u64d4\u4efb\u4f55\u8cac\u4efb\u3002\n\u672c\u535a\u5ba2\u7684\u5167\u5bb9\u53ef\u80fd\u6839\u64da\u6642\u9593\u7684\u63a8\u79fb\u800c\u8b8a\u5316\uff0c\u6211\u5011\u4fdd\u7559\u96a8\u6642\u4fee\u6539\u3001\u66f4\u65b0\u6216\u522a\u9664\u5167\u5bb9\u7684\u6b0a\u5229\u3002\n\u8acb\u6ce8\u610f\uff0c\u672c\u535a\u5ba2\u4e2d\u7684\u89c0\u9ede\u548c\u610f\u898b\u50c5\u4ee3\u8868\u4f5c\u8005\u672c\u4eba\uff0c\u4e26\u4e0d\u4ee3\u8868\u6211\u5011\u7684\u89c0\u9ede\u6216\u7acb\u5834\u3002\n\u6700\u5f8c\uff0c\u6211\u5011\u5f37\u70c8\u5efa\u8b70\u60a8\u81ea\u884c\u6838\u5be6\u548c\u78ba\u8a8d\u4efb\u4f55\u5728\u672c\u535a\u5ba2\u4e2d\u63d0\u4f9b\u7684\u4fe1\u606f\uff0c\u4e26\u6839\u64da\u81ea\u5df1\u7684\u5224\u65b7\u548c\u98a8\u96aa\u627f\u53d7\u80fd\u529b\u63a1\u53d6\u884c\u52d5\u3002\n\u5982\u6709\u4efb\u4f55\u7591\u554f\u6216\u7591\u616e\uff0c\u8acb\u806f\u7e6b\u76f8\u95dc\u5c08\u696d\u4eba\u58eb\u6216\u5c0b\u6c42\u9069\u7576\u7684\u5efa\u8b70\u3002<\/p>\n\n\n\n<p>#FakeQuickBooksScams #CybersecurityThreats #StayVigilant #BewareOfHackers #OnlineSecurity #ScamAlert #SecureYourData #QuickBooksFraud #MaliciousSoftware #GoogleAdsExploitation #EndpointSecurity #StayInformed #DigitalSafety<\/p>","protected":false},"excerpt":{"rendered":"<p>\u99ed\u5ba2\u6b63\u5728\u5229\u7528\u507d\u9020\u7684QuickBooks\u8edf\u9ad4\u6b3a\u9a19\u6beb\u7121\u6212\u5fc3\u7684\u500b\u4eba\u3002 \u9019\u4e00\u4ee4\u4eba\u9707\u9a5a\u7684\u8da8\u52e2\u5f15\u8d77\u4e86\u7db2\u8def\u5b89\u5168\u5c08\u5bb6\u7684\u6ce8\u610f\uff0c\u4ed6\u5011\u6566\u4fc3\u7528\u6236\u4fdd\u6301\u8b66\u60d5\uff0c\u63a1\u53d6\u5fc5\u8981\u7684\u9810\u9632\u63aa\u65bd\uff0c\u4fdd\u8b77\u81ea\u5df1\u514d\u53d7\u6b64\u985e\u8a50\u9a19\u3002<\/p>","protected":false},"author":10,"featured_media":1708,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[19],"tags":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/first-unity.com.hk\/wp-content\/uploads\/2024\/04\/Screenshot-2024-04-18-105811.png","jetpack-related-posts":[{"id":1744,"url":"https:\/\/first-unity.com.hk\/zh\/beware-of-the-rising-threat-of-fakeupdates-safeguarding-cybersecurity\/","url_meta":{"origin":1707,"position":0},"title":"Beware of the Rising Threat of FakeUpdates: Safeguarding Cybersecurity","author":"Thomas Leung","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In recent months, Hong Kong has witnessed a surge in the prevalence of a malicious software called \"FakeUpdates\" or \"SocGholish.\" This JavaScript-based download program has affected over 2.44% of local organizations, highlighting the alarming trend of hackers bypassing traditional defenses and deceiving users through simple techniques. In Check Point's\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-151457.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1740,"url":"https:\/\/first-unity.com.hk\/zh\/beware-of-malicious-software-disguised-as-canva-image-editing-software\/","url_meta":{"origin":1707,"position":1},"title":"Beware of Malicious Software Disguised as Canva Image Editing Software","author":"Steve Parker","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, online scams and fraudulent activities have become increasingly prevalent. It is crucial to stay vigilant and informed to protect ourselves from falling victim to these deceptive tactics. Recently, a deceptive advertisement disguised as Canva image editing software has been circulating on Facebook, posing a significant\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-143814.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-143814.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-143814.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1748,"url":"https:\/\/first-unity.com.hk\/zh\/safeguarding-your-google-account-understanding-the-exploit-that-allows-hackers-to-bypass-passwords\/","url_meta":{"origin":1707,"position":2},"title":"Safeguarding Your Google Account: Understanding the Exploit That Allows Hackers to Bypass Passwords","author":"Lewis Lok","date":"30 5 \u6708, 2024","format":false,"excerpt":"Introduction: In today's digital age, online security has become a major concern for individuals and businesses alike. One of the most widely used platforms, Google, is often considered to have robust security measures in place. However, recent reports have revealed a new vulnerability that allows hackers to gain control of\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/05\/Screenshot-2024-05-30-152928.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1797,"url":"https:\/\/first-unity.com.hk\/zh\/cyberattack-on-anydesk-ensuring-secure-access-through-immediate-updates\/","url_meta":{"origin":1707,"position":3},"title":"Cyberattack on AnyDesk: Ensuring Secure Access through Immediate Updates","author":"Dr. Ken","date":"6 6 \u6708, 2024","format":false,"excerpt":"Introduction: In our increasingly connected world, cybersecurity threats continue to pose significant risks to individuals and organizations alike. Recently, AnyDesk, a prominent provider of remote desktop software, experienced a cyberattack that has raised concerns among its user base. This blog aims to shed light on the incident, outline the measures\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-06-141417.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1781,"url":"https:\/\/first-unity.com.hk\/zh\/zooms-security-issues-safeguarding-privacy-and-security-of-online-meetings\/","url_meta":{"origin":1707,"position":4},"title":"Zoom&#8217;s Security Issues: Safeguarding Privacy and Security of Online Meetings","author":"Dr. Ken","date":"5 6 \u6708, 2024","format":false,"excerpt":"Introduction: With the rapid development of global communication technology, the demand for online meeting platforms has significantly increased. Zoom, being a popular video conferencing tool, gained widespread popularity during the COVID-19 pandemic. However, Zoom has also gained notoriety for its security issues, raising concerns among users and experts. This blog\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-151700.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1809,"url":"https:\/\/first-unity.com.hk\/zh\/anydesk-faces-network-attack-steps-users-can-take-to-ensure-security\/","url_meta":{"origin":1707,"position":5},"title":"AnyDesk Faces Network Attack: Steps Users Can Take to Ensure Security","author":"Randy Yip","date":"8 6 \u6708, 2024","format":false,"excerpt":"Introduction: In recent news, AnyDesk, a popular remote control software used by many individuals in Hong Kong, has been reported to have suffered a network attack. This incident has raised concerns among its users regarding the security of their information. Reports suggest that the program's source code and signing certificates\u2026","rel":"","context":"\u5728\u300cCyber Security\u300d\u4e2d","block_context":{"text":"Cyber Security","link":"https:\/\/first-unity.com.hk\/zh\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/first-unity.com.hk\/wp-content\/uploads\/2024\/06\/Screenshot-2024-06-08-134220.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1707"}],"collection":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/comments?post=1707"}],"version-history":[{"count":0,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/posts\/1707\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media\/1708"}],"wp:attachment":[{"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/media?parent=1707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/categories?post=1707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/first-unity.com.hk\/zh\/wp-json\/wp\/v2\/tags?post=1707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}