{"id":406,"count":2,"description":"","link":"https:\/\/knowledgeflow.org\/uk\/tag\/malicious-apps\/","name":"\u0448\u043a\u0456\u0434\u043b\u0438\u0432\u0456 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u0438","slug":"malicious-apps","taxonomy":"post_tag","meta":[],"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tags\/406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tags"}],"about":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/taxonomies\/post_tag"}],"wp:post_type":[{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/posts?tags=406"},{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tribe_events?tags=406"},{"href":"https:\/\/knowledgeflow.org\/uk\/wp-json\/wp\/v2\/tec_calendar_embed?tags=406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}