{"id":7352,"date":"2024-09-12T18:39:43","date_gmt":"2024-09-12T13:09:43","guid":{"rendered":"https:\/\/drtktopecollege.in\/?p=7352"},"modified":"2024-09-12T18:55:03","modified_gmt":"2024-09-12T13:25:03","slug":"lecture-on-cyber-security-psi-bharat-gurav","status":"publish","type":"post","link":"https:\/\/drtktopecollege.in\/?p=7352","title":{"rendered":"Lecture on Cyber Security &#8211; PSI Bharat Gurav"},"content":{"rendered":"\n<p>NSS department under the leadership of Programme officer Sandeep Kajabe organised a lecture on cyber security on Thursday 29th Aug. 2024 from 7 pm to 8:30 pm. I\/C Principal Nagesh Suryawanshi presided over the function. Around 50 NSS volunteers and other students attended the lecture.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet-1024x768.jpg\" alt=\"I\/C Principal Nagesh Suryawanshi presenting the bouquet to PSI Bharat Gurav of Vile Parle Police Station\" class=\"wp-image-7357\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet-1024x768.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet-300x225.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet-768x576.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet-1536x1152.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-boquet.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">I\/C Principal Nagesh Suryawanshi presenting the bouquet to PSI Bharat Gurav of Vile Parle Police Station<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe-1024x768.jpg\" alt=\"Programme officer Prof. Sandeep Kajabe explaining the purpose of the lecture.\" class=\"wp-image-7359\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe-1024x768.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe-300x225.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe-768x576.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe-1536x1152.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Programme-Office-Sandeep-Kajabe.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Programme officer Prof. Sandeep Kajabe explaining the purpose of the lecture.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024-1024x576.jpg\" alt=\"\" class=\"wp-image-7353\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024-1024x576.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024-300x169.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024-768x432.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024-1536x864.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Cyber-security-lecture-29-Aug-2024.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Cyber Security Awareness: Protect Yourself from Digital Fraud<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2-1024x768.jpg\" alt=\"\" class=\"wp-image-7355\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2-1024x768.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2-300x225.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2-768x576.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2-1536x1152.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-2.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">PSI Bharat Gurav, In-charge of Cyber Security Cell, Vile Parle Police Station, delivering a lecture on cyber security.<\/figcaption><\/figure>\n\n\n\n<p>In today&#8217;s increasingly digital world, cybercrime is on the rise. A recent guest lecture by a senior police officer from <strong>Vile Parle Police station Police Sub-Inspector and in charge of cyber security cell of the police station, Bharat Gurav,  <\/strong>at our college highlighted the key threats in cyberspace and how to stay safe. Below are essential tips and insights shared during the session to help safeguard yourself from cyber frauds:<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">\u0905\u0928\u0941\u0915\u094d\u0930\u092e\u0923\u093f\u0915\u093e<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69f47af1e82d5\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69f47af1e82d5\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#1_Protect_Your_Financial_Information\" >1. Protect Your Financial Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#2_Beware_of_Unauthorised_Applications_and_Files\" >2. Beware of Unauthorised Applications and Files<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#3_Social_Media_Risks\" >3. Social Media Risks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#4_Common_Cyber_Frauds_to_Watch_Out_For\" >4. Common Cyber Frauds to Watch Out For<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#5_Senior_Citizens_as_Targets\" >5. Senior Citizens as Targets<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#6_Immediate_Action_in_Case_of_Cybercrime\" >6. Immediate Action in Case of Cybercrime<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#7_Precautionary_Measures\" >7. Precautionary Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/drtktopecollege.in\/?p=7352\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Protect_Your_Financial_Information\"><\/span>1. <strong>Protect Your Financial Information<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Never share OTPs<\/strong>: No matter the situation, do not share your OTP with anyone. Fraudsters often pose as bank representatives or other officials to trick you into giving up your OTP.<\/li>\n\n\n\n<li><strong>Banks will never ask for your personal details over the phone<\/strong>: Be wary of calls or messages asking for sensitive information like your account number or password. Legitimate institutions will never request such details.<\/li>\n\n\n\n<li><strong>Loan app scams<\/strong>: Before downloading any loan application, ensure it is authorised by official financial institutions. Fraudulent loan apps can steal your data or manipulate you.<\/li>\n\n\n\n<li><strong>GPay and digital payment fraud<\/strong>: Scammers may use digital payment platforms like GPay for their schemes. Always verify before making any transactions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Beware_of_Unauthorised_Applications_and_Files\"><\/span>2. <strong>Beware of Unauthorised Applications and Files<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>APK files from unknown sources are dangerous<\/strong>: These files can allow hackers to control your phone, steal your data, or access your contacts.<\/li>\n\n\n\n<li><strong>Your personal information is at risk<\/strong>: Unauthorised apps may gain access to your mobile data, including contacts and sensitive personal details, which can then be used for fraudulent purposes.<\/li>\n\n\n\n<li><strong>Be cautious of unknown WhatsApp and international calls<\/strong>: Receiving unsolicited calls, especially from unknown numbers or international sources, could be part of a scam attempt.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-1024x576.jpg\" alt=\"\" class=\"wp-image-7354\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-1024x576.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-300x169.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-768x432.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav-1536x864.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/PSI-Bharat-Gurav.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa-1024x576.jpg\" alt=\"Prof. Shubharaj Buwa and Prof. Pramod Dhengle were also present during the lecture.\" class=\"wp-image-7364\" srcset=\"https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa-1024x576.jpg 1024w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa-300x169.jpg 300w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa-768x432.jpg 768w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa-1536x864.jpg 1536w, https:\/\/drtktopecollege.in\/wp-content\/uploads\/2024\/09\/Prof.-Pramod-Dhengle-and-Prof-Shubharaj-Buwa.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Prof. Shubharaj Buwa and Prof. Pramod Dhengle were also present during the lecture.<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Social_Media_Risks\"><\/span>3. <strong>Social Media Risks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Instagram Reels and similar platforms<\/strong>: Excessive time spent on social media can expose you to scams, especially fraudulent job offers through Reels or unsolicited chat requests.<\/li>\n\n\n\n<li><strong>AI and Sextortion<\/strong>: Cybercriminals are using artificial intelligence to manipulate videos and images, potentially blackmailing victims with morphed photos. Never engage with unknown people in video calls or chats.<\/li>\n\n\n\n<li><strong>Your voice can be misused<\/strong>: Even your voice, available on social media, can be replicated using AI for fraudulent purposes. Be cautious about what you share online.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Common_Cyber_Frauds_to_Watch_Out_For\"><\/span>4. <strong>Common Cyber Frauds to Watch Out For<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Share market fraud<\/strong>: Scams related to share trading, especially in regions like Jamtara (Jharkhand), West Bengal, and Rajasthan, are becoming more prevalent. Be vigilant about unsolicited investment advice.<\/li>\n\n\n\n<li><strong>Crypto trading scams<\/strong>: Cryptocurrency trading is still not fully regulated in India, and platforms like Binance have been banned. Avoid engaging in crypto trading to protect yourself from fraud.<\/li>\n\n\n\n<li><strong>Nigerian fraud and parcel scams<\/strong>: Fraudsters often pose as customs officials, demanding payments for parcels or other goods. Never fall for such schemes without verifying their legitimacy.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Senior_Citizens_as_Targets\"><\/span>5. <strong>Senior Citizens as Targets<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cyber fraudsters target senior citizens<\/strong>: Criminals often take advantage of older individuals who may not be as aware of digital fraud. Educate your elders and help them navigate online spaces safely.<\/li>\n\n\n\n<li><strong>SIM card misuse<\/strong>: Ensure that your SIM card is properly linked with your Aadhar, as criminals often misuse SIM cards. Be aware that only four SIM cards can be authorised with one Aadhar card.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Immediate_Action_in_Case_of_Cybercrime\"><\/span>6. <strong>Immediate Action in Case of Cybercrime<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The golden period of 4 hours<\/strong>: If you fall victim to a cybercrime, acting within the first 4 hours is critical. Contact the cybercrime helpline immediately.<\/li>\n\n\n\n<li><strong>Helpline numbers<\/strong>:\n<ul class=\"wp-block-list\">\n<li><strong>1930<\/strong> \u2013 Cybercrime helpline number for urgent assistance.<\/li>\n\n\n\n<li><strong>103<\/strong> \u2013 Helpline for women in distress.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Fraudsters\u2019 &#8220;Digital Arrest&#8221; scam<\/strong>: One of the most disturbing tactics used by cybercriminals, particularly on senior citizens, is the threat of a so-called &#8220;digital arrest.&#8221; In this scam, fraudsters pose as government officials, police officers, or even employees of major companies. They claim that the victim has committed a financial crime (like failing to pay taxes, using an unauthorised app, or breaching banking laws).Using this false claim, the fraudsters will threaten that a &#8220;digital arrest&#8221; is about to be issued, where all of the victim&#8217;s bank accounts will be frozen, or worse, they will be legally prosecuted or imprisoned unless immediate action is taken. The scammers often demand a quick payment or personal information, urging the victim to &#8220;settle&#8221; the matter before it&#8217;s too late.<\/li>\n\n\n\n<li><strong>Harassment and persistence<\/strong>: Fraudsters often harass senior citizens repeatedly, using threatening language or claiming to be from different agencies to create panic and urgency. This ongoing pressure can cause emotional distress, leading victims to comply out of fear. The fraudsters may even use AI-driven technology to fake official documents or simulate legal notices, adding further credibility to their lies.<\/li>\n\n\n\n<li><strong>How to Respond<\/strong>: It&#8217;s important for victims or their family members to report these incidents immediately. The <strong>1930<\/strong> helpline and local cybercrime units can provide support and guidance. Never respond to such threats without verifying the source, and never transfer money or share sensitive information.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"7_Precautionary_Measures\"><\/span>7. <strong>Precautionary Measures<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Don&#8217;t disclose your location<\/strong>: When chatting or engaging online, avoid sharing your current location, especially with strangers or on social platforms.<\/li>\n\n\n\n<li><strong>Use multiple digital signatures<\/strong>: When dealing with official digital documents, it&#8217;s wise to use two or more signatures to avoid forgery or tampering.<\/li>\n\n\n\n<li><strong>Speak in Marathi to throw off fraudsters<\/strong>: In some cases, scammers operate using specific languages. Communicating in your local language, like Marathi, could help you detect if you&#8217;re dealing with a fraudster.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Cybersecurity is a shared responsibility, and it is crucial to stay informed about potential threats. Always verify the authenticity of digital platforms, apps, and calls, and be mindful of your personal information. The rise of sophisticated cybercrimes, including sextortion, social media fraud, and financial scams, requires a proactive approach to online safety.<\/p>\n\n\n\n<p>For more information and assistance, visit the <a href=\"https:\/\/cybercrime.gov.in\/\" data-type=\"link\" data-id=\"https:\/\/cybercrime.gov.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">official government website<\/a> or contact the relevant helplines provided above. Stay alert, stay safe!<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSS department under the leadership of Programme officer Sandeep Kajabe organised a lecture on cyber security on Thursday 29th Aug. 2024 from 7 pm to 8:30 pm. I\/C Principal Nagesh Suryawanshi presided over the function. Around 50 NSS volunteers and other students attended the lecture. Cyber Security Awareness: Protect Yourself from Digital Fraud In today&#8217;s&#8230;<\/p>\n","protected":false},"author":1,"featured_media":7357,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kadence_starter_templates_imported_post":false,"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[267],"tags":[],"class_list":["post-7352","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nss-2024-25"],"_links":{"self":[{"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/posts\/7352","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7352"}],"version-history":[{"count":5,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/posts\/7352\/revisions"}],"predecessor-version":[{"id":7366,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/posts\/7352\/revisions\/7366"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=\/wp\/v2\/media\/7357"}],"wp:attachment":[{"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7352"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7352"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drtktopecollege.in\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7352"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}