{"id":1571,"date":"2014-09-02T07:56:50","date_gmt":"2014-09-02T07:56:50","guid":{"rendered":"http:\/\/www.kaspersky.com.cn\/blog\/?p=1571"},"modified":"2020-02-27T00:17:15","modified_gmt":"2020-02-26T16:17:15","slug":"%e5%8d%81%e5%a4%a7%e4%b8%93%e4%b8%9a%e7%bd%91%e7%ab%99%e6%9e%81%e5%8a%9b%e6%8e%a8%e8%8d%90%e5%8d%a1%e5%b7%b4%e6%96%af%e5%9f%ba%e5%ae%89%e5%85%a8%e8%bd%af%e4%bb%b62015","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.cn\/blog\/%e5%8d%81%e5%a4%a7%e4%b8%93%e4%b8%9a%e7%bd%91%e7%ab%99%e6%9e%81%e5%8a%9b%e6%8e%a8%e8%8d%90%e5%8d%a1%e5%b7%b4%e6%96%af%e5%9f%ba%e5%ae%89%e5%85%a8%e8%bd%af%e4%bb%b62015\/1571\/","title":{"rendered":"\u5341\u5927\u4e13\u4e1a\u7f51\u7ad9\u6781\u529b\u63a8\u8350\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015"},"content":{"rendered":"<p>\u591a\u5bb6\u5b89\u5168\u9886\u57df\u4e13\u4e1a\u7f51\u7ad9\u5bf9\u5168\u65b0<a href=\"https:\/\/www.kaspersky.com.cn\/KL-Products\/HomeUsers\/kis2015.htm\" target=\"_blank\" rel=\"noopener\">\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6201<\/a>5\u6781\u529b\u63a8\u8350\uff0c\u5bf9\u4e8e\u65b0\u4ea7\u54c1\u7684\u9632\u5fa1\u80fd\u529b\u3001\u6613\u7528\u6027\u4ee5\u53ca\u8d44\u6e90\u5360\u7528\u5c11\u7b49\u7279\u70b9\u66f4\u662f\u8d5e\u4e0d\u7edd\u53e3\u3002\u6211\u4eec\u4e0d\u4fbf\u8bc4\u4ef7\u81ea\u5df1\u7684\u4ea7\u54c1\uff0c\u4e0b\u9762\u8ba9\u6211\u4eec\u4e00\u8d77\u6765\u542c\u542c\u5b89\u5168\u9886\u57df\u7684\u5341\u5927\u4e13\u4e1a\u7f51\u7ad9\u662f\u5982\u4f55\u8bc4\u4ef7\u6211\u4eec\u7684\u65b0\u4ea7\u54c1\uff1a<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/97\/2014\/09\/06150721\/Our-favorite-press-quotes-1.png\" alt=\"\" width=\"640\" height=\"480\"><\/p>\n<p><em>\u5b89\u5168\u9886\u57df\u5341\u5927\u4e13\u4e1a\u7f51\u7ad9\u5bf9\u5168\u65b0\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u6781\u529b\u63a8\u8350<\/em><\/p>\n<p>1.<a href=\"http:\/\/www.7tutorials.com\/security-everyone-reviewing-kaspersky-internet-security-2015\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">7 Tutorials\u7f51\u7ad9<\/a>\u8868\u793a\uff0cKIS 2015\u2033\u7ee7\u7eed\u5411\u5e02\u573a\u4ea4\u4ed8\u6700\u51fa\u8272\u7684\u53cd\u6076\u610f\u8f6f\u4ef6\u4fdd\u62a4\u529f\u80fd\uff0c\u5176\u6027\u80fd\u5f71\u54cd\u5bf9\u4e8e\u6700\u65b0\u7535\u8111\u548c\u8bbe\u5907\u51e0\u4e4e\u53ef\u4ee5\u5ffd\u7565\u4e0d\u8ba1\u3002\u201d<\/p>\n<p>2.<a href=\"http:\/\/betanews.com\/2014\/07\/22\/kaspersky-internet-security-2015-an-accurate-and-reliable-security-suite-review\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Betanews\u7f51\u7ad9\u8fd9\u6837\u5199\u9053<\/a>\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u5728\u4e00\u4e9b\u91cd\u8981\u7684\u5b89\u5168\u529f\u80fd\u65b9\u9762\u66f4\u80dc\u4e00\u7b79\uff1a\u8fd9\u662f\u4e00\u5957\u7cbe\u786e\u4e14\u53ef\u9760\u7684\u5b89\u5168\u4ea7\u54c1\uff0c\u5728\u9632\u8303\u6076\u610f\u8f6f\u4ef6\u65b9\u9762\u5c24\u5176\u51fa\u8272\u3002\u201d<\/p>\n<p>3.<a href=\"http:\/\/www.pcworld.com\/article\/2459156\/kaspersky-internet-security-2015-multi-device-review-new-interface-same-excellent-protection.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">PCWorld\u7f51\u7ad9<\/a>\u5bf9\u5361\u5df4\u65af\u57fa\u591a\u8bbe\u5907\u7248\u7684\u4fdd\u62a4\u529f\u80fd\u6781\u529b\u63a8\u8350\uff0c\u5e76\u8868\u793a\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\u2014\u591a\u8bbe\u5907\u72482015\u5c06\u6210\u4e3a\u8bbe\u5907\u8ff7\u4eec\u7684\u6700\u7231\u3002\u4fdd\u62a4\u80fd\u529b\u548c\u6027\u80fd\u51fa\u8272\uff0c\u4e14\u754c\u9762\u8bbe\u8ba1\u66f4\u4e3a\u7cbe\u81f4\u4f18\u7f8e\uff0c\u4e14\u76f8\u6bd42014\u7248\u5728\u5b9e\u7528\u6027\u65b9\u9762\u4e1d\u6beb\u6ca1\u6709\u51cf\u5f31\u3002\u201d<\/p>\n<p>4.<a href=\"http:\/\/www.amazon.com\/Kaspersky-Internet-Security-2015-PCs\/product-reviews\/B00LC9UU6C\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">\u4e9a\u9a6c\u900a\u7f51\u7ad9<\/a>\u7ed9\u4e88KIS 2015\u6700\u9ad8\u5206\u4e94\u9897\u661f\u7684\u8bc4\u4ef7\uff0c\u8be5\u7f51\u7ad9\u8bc4\u8bba\u5458Danny Penn\u8868\u793a\uff1a\u201d\u5982\u679c\u6211\u7684KIS 2015\u4f7f\u7528\u5230\u671f\u4e86\uff0c\u6211\u4e00\u5b9a\u4f1a\u7eed\u8ba2\u7684\u2026\u201d<\/p>\n<p>5.<a href=\"http:\/\/www.softwarecrew.com\/2014\/07\/review-kaspersky-internet-security-2015\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Software Crew\u7f51\u7ad9<\/a>\u8868\u793aKIS 2015\u7684\u5bb6\u957f\u63a7\u5236\u529f\u80fd\u662f\u201d\u4e00\u6b3e\u4f18\u79c0\u7684\u7ec4\u4ef6\uff0c\u5b8c\u5168\u80fd\u4e0e\u5176\u5b83\u72ec\u7acb\u4ea7\u54c1\u76f8\u5ab2\u7f8e\u3002\u201d\u5bf9\u4e8eSafe Money\u529f\u80fd\uff0c\u4ed6\u4eec\u8fd9\u6837\u5199\u9053\uff1a\u201d\u6211\u4eec\u603b\u5171\u7528\u4e863\u79cd\u5546\u4e1a\u952e\u76d8\u8bb0\u5f55\u5668\u8fdb\u884c\u4e86\u6d4b\u8bd5\uff0c\u6d4b\u8bd5\u7ed3\u679c\u8ba9\u6211\u4eec\u5b8c\u5168\u786e\u4fe1\u53ea\u8981\u5b89\u88c5 Safe Money\u529f\u80fd\uff0c\u80fd\u591f\u9632\u5fa1\u4efb\u4f55\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u7684\u76d7\u7a83\u884c\u4e3a\u3002\u201d<\/p>\n<div class=\"pullquote\"><em>\u201cKIS 2015\u7ee7\u7eed\u5411\u5e02\u573a\u4ea4\u4ed8\u6700\u51fa\u8272\u7684\u53cd\u6076\u610f\u8f6f\u4ef6\u4fdd\u62a4\u529f\u80fd\uff0c\u5176\u6027\u80fd\u5f71\u54cd\u5bf9\u4e8e\u6700\u65b0\u7684\u7535\u8111\u548c\u8bbe\u5907\u51e0\u4e4e\u53ef\u4ee5\u5ffd\u7565\u4e0d\u8ba1\u3002\u201d \u2013 7 Tutorials\u7f51\u7ad9<\/em><\/div>\n<p>6.\u201d\u603b\u4f53\u6765\u8bf4\uff0c\u8fd9\u6b3e\u4ea7\u54c1\u662f\u76ee\u524d\u6700\u51fa\u8272\u7684\u5b89\u5168\u5957\u4ef6\u4e4b\u4e00\uff0c\u201dMalware Tips\u7f51\u7ad9\u8bc4\u8bba\u5458MrExplorer\u8fd9\u6837\u5199\u9053\u2013\u800cMalware Tips\u7f51\u7ad9\u6210\u5458BoraMurdar\u5374\u5bf9\u8fd9\u4e00\u8bc4\u4ef7\u201d\u4e0d\u592a\u8ba4\u540c\u201d\uff0c\u4ed6\u8fd9\u6837\u8bf4\u9053\uff1a\u201d\u8fd9\u6b3e\u4ea7\u54c1\u5e76\u4e0d\u662f\u53ef\u80fd\u6700\u51fa\u8272\uff0c\u800c\u662f\u7684\u7684\u786e\u786e\u6700\u51fa\u8272\uff0c\u6ca1\u6709\u4e4b\u4e00\u3002\u201d<\/p>\n<p>7.<a href=\"http:\/\/download.cnet.com\/Kaspersky-Internet-Security-2015\/3000-18510_4-10012072.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CNet\u2019s Download.com<\/a>\u7f51\u7ad9\u8868\u793a\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u662f\u8fc4\u4eca\u4e3a\u6b62\u6700\u4f18\u79c0\u7684\u7248\u672c\uff0c\u5e76\u663e\u7136\u662f\u4e13\u4e3aWindows\u7cfb\u7edf\u800c\u8bbe\u8ba1\u7684\u53cd\u75c5\u6bd2\u5e94\u7528\u4e2d\u6700\u51fa\u8272\u7684\u4e00\u6b3e\u3002\u201d\u8be5\u7f51\u7ad9\u8fd8\u5c06KIS 2015\u6dfb\u52a0\u8fdb\u4e86\u201d\u4f18\u9009\u4ea7\u54c1\u201d\u5217\u8868\u3002<\/p>\n<p>8.<a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2460964,00.asp\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">PCMag\u7f51\u7ad9<\/a>\u8bf4\u9053\uff1a\u201d\u53cd\u75c5\u6bd2\u529f\u80fd\u662f\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\uff082015\uff09\u7684\u660e\u661f\u7ec4\u4ef6\uff0c\u5728\u6240\u6709\u72ec\u7acb[\u6d4b\u8bd5]\u5b9e\u9a8c\u5ba4\u90fd\u83b7\u5f97\u4e86\u6700\u9ad8\u8bc4\u5206\u3002\u201d<\/p>\n<p>9.\u201d\u6211\u4eec\u90fd\u559c\u6b22\u8fd9\u4e00\u5168\u65b0\u7684\u754c\u9762\uff0c\u5f53\u7136\u8fd8\u5c11\u4e0d\u4e86\u62e5\u6709\u5f3a\u5927\u9632\u5fa1\u529f\u80fd\u7684\u5957\u4ef6\u3002\u201d TechWorld\u8fd9\u6837\u8bf4\u9053\u3002<\/p>\n<p>10.\u201d\u53ef\u4ee5\u8bf4\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\u591a\u8bbe\u5907\u72482015\u662f\u6211\u76ee\u524d\u770b\u5230\u8fc7\u7684\u6700\u51fa\u8272\u7684\u53cd\u75c5\u6bd2\u8f6f\u4ef6\uff0c\u201d <a href=\"http:\/\/www.consumerhighfive.com\/kaspersky-internet-security-multi-device-2015\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Consumer High Five\u7f51\u7ad9<\/a>\u8bf4\u9053\uff0c\u968f\u540e\u53c8\u8865\u5145\u8bf4\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5c06\u5176\u53cd\u75c5\u6bd2\u7a0b\u5e8f\u7684\u80fd\u529b\u53c8\u63d0\u5347\u4e86\u4e00\u4e2a\u6863\u6b21\u3002\u201d<\/p>\n<p><em>KIS 2015\uff1a\u867d\u7136\u5b89\u5168\u9886\u57df\u4e13\u4e1a\u7f51\u7ad9\u90fd\u7ed9\u4e88\u4e86\u9ad8\u5ea6\u8bc4\u4ef7\uff0c#\u4f46\u6211\u4eec\u4f9d\u7136\u8fd8\u6709\u9700\u8981\u6539\u8fdb\u7684\u65b9\u9762<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u591a\u5bb6\u5b89\u5168\u9886\u57df\u4e13\u4e1a\u7f51\u7ad9\u5bf9\u5168\u65b0\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u6781\u529b\u63a8\u8350\uff0c\u5bf9\u4e8e\u65b0\u4ea7\u54c1\u7684\u9632\u5fa1\u80fd\u529b\u3001\u6613\u7528\u6027\u4ee5\u53ca\u8d44\u6e90\u5360\u7528\u5c11\u7b49\u7279\u70b9\u66f4\u662f\u8d5e\u4e0d\u7edd\u53e3\u3002\u6211\u4eec\u4e0d\u4fbf\u8bc4\u4ef7\u81ea\u5df1\u7684\u4ea7\u54c1\uff0c\u4e0b\u9762\u8ba9\u6211\u4eec\u4e00\u8d77\u6765\u542c\u542c\u5b89\u5168\u9886\u57df\u7684\u5341\u5927\u4e13\u4e1a\u7f51\u7ad9\u662f\u5982\u4f55\u8bc4\u4ef7\u6211\u4eec\u7684\u65b0\u4ea7\u54c1\uff1a \u5b89\u5168\u9886\u57df\u5341\u5927\u4e13\u4e1a\u7f51\u7ad9\u5bf9\u5168\u65b0\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u6781\u529b\u63a8\u8350 1.7 Tutorials\u7f51\u7ad9\u8868\u793a\uff0cKIS 2015\u2033\u7ee7\u7eed\u5411\u5e02\u573a\u4ea4\u4ed8\u6700\u51fa\u8272\u7684\u53cd\u6076\u610f\u8f6f\u4ef6\u4fdd\u62a4\u529f\u80fd\uff0c\u5176\u6027\u80fd\u5f71\u54cd\u5bf9\u4e8e\u6700\u65b0\u7535\u8111\u548c\u8bbe\u5907\u51e0\u4e4e\u53ef\u4ee5\u5ffd\u7565\u4e0d\u8ba1\u3002\u201d 2.Betanews\u7f51\u7ad9\u8fd9\u6837\u5199\u9053\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u5728\u4e00\u4e9b\u91cd\u8981\u7684\u5b89\u5168\u529f\u80fd\u65b9\u9762\u66f4\u80dc\u4e00\u7b79\uff1a\u8fd9\u662f\u4e00\u5957\u7cbe\u786e\u4e14\u53ef\u9760\u7684\u5b89\u5168\u4ea7\u54c1\uff0c\u5728\u9632\u8303\u6076\u610f\u8f6f\u4ef6\u65b9\u9762\u5c24\u5176\u51fa\u8272\u3002\u201d 3.PCWorld\u7f51\u7ad9\u5bf9\u5361\u5df4\u65af\u57fa\u591a\u8bbe\u5907\u7248\u7684\u4fdd\u62a4\u529f\u80fd\u6781\u529b\u63a8\u8350\uff0c\u5e76\u8868\u793a\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\u2014\u591a\u8bbe\u5907\u72482015\u5c06\u6210\u4e3a\u8bbe\u5907\u8ff7\u4eec\u7684\u6700\u7231\u3002\u4fdd\u62a4\u80fd\u529b\u548c\u6027\u80fd\u51fa\u8272\uff0c\u4e14\u754c\u9762\u8bbe\u8ba1\u66f4\u4e3a\u7cbe\u81f4\u4f18\u7f8e\uff0c\u4e14\u76f8\u6bd42014\u7248\u5728\u5b9e\u7528\u6027\u65b9\u9762\u4e1d\u6beb\u6ca1\u6709\u51cf\u5f31\u3002\u201d 4.\u4e9a\u9a6c\u900a\u7f51\u7ad9\u7ed9\u4e88KIS 2015\u6700\u9ad8\u5206\u4e94\u9897\u661f\u7684\u8bc4\u4ef7\uff0c\u8be5\u7f51\u7ad9\u8bc4\u8bba\u5458Danny Penn\u8868\u793a\uff1a\u201d\u5982\u679c\u6211\u7684KIS 2015\u4f7f\u7528\u5230\u671f\u4e86\uff0c\u6211\u4e00\u5b9a\u4f1a\u7eed\u8ba2\u7684\u2026\u201d 5.Software Crew\u7f51\u7ad9\u8868\u793aKIS 2015\u7684\u5bb6\u957f\u63a7\u5236\u529f\u80fd\u662f\u201d\u4e00\u6b3e\u4f18\u79c0\u7684\u7ec4\u4ef6\uff0c\u5b8c\u5168\u80fd\u4e0e\u5176\u5b83\u72ec\u7acb\u4ea7\u54c1\u76f8\u5ab2\u7f8e\u3002\u201d\u5bf9\u4e8eSafe Money\u529f\u80fd\uff0c\u4ed6\u4eec\u8fd9\u6837\u5199\u9053\uff1a\u201d\u6211\u4eec\u603b\u5171\u7528\u4e863\u79cd\u5546\u4e1a\u952e\u76d8\u8bb0\u5f55\u5668\u8fdb\u884c\u4e86\u6d4b\u8bd5\uff0c\u6d4b\u8bd5\u7ed3\u679c\u8ba9\u6211\u4eec\u5b8c\u5168\u786e\u4fe1\u53ea\u8981\u5b89\u88c5 Safe Money\u529f\u80fd\uff0c\u80fd\u591f\u9632\u5fa1\u4efb\u4f55\u7f51\u7edc\u72af\u7f6a\u5206\u5b50\u7684\u76d7\u7a83\u884c\u4e3a\u3002\u201d \u201cKIS 2015\u7ee7\u7eed\u5411\u5e02\u573a\u4ea4\u4ed8\u6700\u51fa\u8272\u7684\u53cd\u6076\u610f\u8f6f\u4ef6\u4fdd\u62a4\u529f\u80fd\uff0c\u5176\u6027\u80fd\u5f71\u54cd\u5bf9\u4e8e\u6700\u65b0\u7684\u7535\u8111\u548c\u8bbe\u5907\u51e0\u4e4e\u53ef\u4ee5\u5ffd\u7565\u4e0d\u8ba1\u3002\u201d \u2013 7 Tutorials\u7f51\u7ad9 6.\u201d\u603b\u4f53\u6765\u8bf4\uff0c\u8fd9\u6b3e\u4ea7\u54c1\u662f\u76ee\u524d\u6700\u51fa\u8272\u7684\u5b89\u5168\u5957\u4ef6\u4e4b\u4e00\uff0c\u201dMalware Tips\u7f51\u7ad9\u8bc4\u8bba\u5458MrExplorer\u8fd9\u6837\u5199\u9053\u2013\u800cMalware Tips\u7f51\u7ad9\u6210\u5458BoraMurdar\u5374\u5bf9\u8fd9\u4e00\u8bc4\u4ef7\u201d\u4e0d\u592a\u8ba4\u540c\u201d\uff0c\u4ed6\u8fd9\u6837\u8bf4\u9053\uff1a\u201d\u8fd9\u6b3e\u4ea7\u54c1\u5e76\u4e0d\u662f\u53ef\u80fd\u6700\u51fa\u8272\uff0c\u800c\u662f\u7684\u7684\u786e\u786e\u6700\u51fa\u8272\uff0c\u6ca1\u6709\u4e4b\u4e00\u3002\u201d 7.CNet\u2019s Download.com\u7f51\u7ad9\u8868\u793a\uff1a\u201d\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef62015\u662f\u8fc4\u4eca\u4e3a\u6b62\u6700\u4f18\u79c0\u7684\u7248\u672c\uff0c\u5e76\u663e\u7136\u662f\u4e13\u4e3aWindows\u7cfb\u7edf\u800c\u8bbe\u8ba1\u7684\u53cd\u75c5\u6bd2\u5e94\u7528\u4e2d\u6700\u51fa\u8272\u7684\u4e00\u6b3e\u3002\u201d\u8be5\u7f51\u7ad9\u8fd8\u5c06KIS 2015\u6dfb\u52a0\u8fdb\u4e86\u201d\u4f18\u9009\u4ea7\u54c1\u201d\u5217\u8868\u3002 8.PCMag\u7f51\u7ad9\u8bf4\u9053\uff1a\u201d\u53cd\u75c5\u6bd2\u529f\u80fd\u662f\u5361\u5df4\u65af\u57fa\u5b89\u5168\u8f6f\u4ef6\uff082015\uff09\u7684\u660e\u661f\u7ec4\u4ef6\uff0c\u5728\u6240\u6709\u72ec\u7acb[\u6d4b\u8bd5]\u5b9e\u9a8c\u5ba4\u90fd\u83b7\u5f97\u4e86\u6700\u9ad8\u8bc4\u5206\u3002\u201d 9.\u201d\u6211\u4eec\u90fd\u559c\u6b22\u8fd9\u4e00\u5168\u65b0\u7684\u754c\u9762\uff0c\u5f53\u7136\u8fd8\u5c11\u4e0d\u4e86\u62e5\u6709\u5f3a\u5927\u9632\u5fa1\u529f\u80fd\u7684\u5957\u4ef6\u3002\u201d<\/p>\n","protected":false},"author":41,"featured_media":1575,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1448,1506],"tags":[363,870,857],"class_list":{"0":"post-1571","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-threats","9":"tag-kis-2015","10":"tag-870","11":"tag-857"},"hreflang":[{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/%e5%8d%81%e5%a4%a7%e4%b8%93%e4%b8%9a%e7%bd%91%e7%ab%99%e6%9e%81%e5%8a%9b%e6%8e%a8%e8%8d%90%e5%8d%a1%e5%b7%b4%e6%96%af%e5%9f%ba%e5%ae%89%e5%85%a8%e8%bd%af%e4%bb%b62015\/1571\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.cn\/blog\/tag\/kis-2015\/","name":"KIS 2015"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/1571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/comments?post=1571"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/1571\/revisions"}],"predecessor-version":[{"id":10912,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/posts\/1571\/revisions\/10912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media\/1575"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/media?parent=1571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/categories?post=1571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.cn\/blog\/wp-json\/wp\/v2\/tags?post=1571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}