{"id":44643,"date":"2022-06-20T06:07:00","date_gmt":"2022-06-20T10:07:00","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine-episode&#038;p=44643"},"modified":"2023-05-16T05:47:03","modified_gmt":"2023-05-16T09:47:03","slug":"how-cybercriminals-used-stolen-student-identities","status":"publish","type":"emagazine-episode","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/video-series\/how-cybercriminals-used-stolen-student-identities\/44643\/","title":{"rendered":"How cybercriminals used stolen student identities"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":2521,"featured_media":47791,"template":"","coauthors":[3452],"class_list":["post-44643","emagazine-episode","type-emagazine-episode","status-publish","has-post-thumbnail"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode\/44643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine-episode"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine-episode"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/47791"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=44643"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=44643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}