{"id":2254,"date":"2025-01-03T02:15:07","date_gmt":"2025-01-03T02:15:07","guid":{"rendered":"https:\/\/nurosoft.id\/blog\/?p=2254"},"modified":"2025-12-22T11:31:06","modified_gmt":"2025-12-22T11:31:06","slug":"jenis-jenis-malware","status":"publish","type":"post","link":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/","title":{"rendered":"Jenis-Jenis Malware dan Cara Menghindarinya"},"content":{"rendered":"<p>Dalam era digital yang semakin maju, ancaman siber seperti malware menjadi salah satu risiko utama bagi individu, bisnis, dan organisasi. Malware, singkatan dari <strong>malicious software<\/strong>, dirancang untuk merusak, mencuri data, atau mengganggu sistem perangkat Anda. Tanpa perlindungan yang memadai, malware dapat menyebabkan kerugian besar, baik secara finansial maupun reputasi. Artikel ini akan membahas jenis-jenis malware, cara kerja masing-masing, serta langkah-langkah efektif untuk menghindarinya.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2255\" src=\"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\" alt=\"jenis-jenis-malware\" width=\"2560\" height=\"1708\" srcset=\"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg 2560w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-300x200.jpg 300w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-1024x683.jpg 1024w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-768x512.jpg 768w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-1536x1025.jpg 1536w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-2048x1366.jpg 2048w, https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-1568x1046.jpg 1568w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/strong><\/h3>\n<p>&nbsp;<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_83 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Daftar Isi<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Apa_Itu_Malware\" >Apa Itu Malware?<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Karakteristik_Malware\" >Karakteristik Malware:<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Jenis-Jenis_Malware\" >Jenis-Jenis Malware<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#a_Virus\" >a. Virus<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#b_Worm\" >b. Worm<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#c_Trojan_Horse\" >c. Trojan Horse<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#d_Ransomware\" >d. Ransomware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#e_Spyware\" >e. Spyware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#f_Adware\" >f. Adware<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#g_Rootkit\" >g. Rootkit<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#h_Keylogger\" >h. Keylogger<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Cara_Menghindari_Malware\" >Cara Menghindari Malware<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#a_Gunakan_Software_Antivirus_Terpercaya\" >a. Gunakan Software Antivirus Terpercaya<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#b_Hindari_Mengklik_Link_atau_Lampiran_Mencurigakan\" >b. Hindari Mengklik Link atau Lampiran Mencurigakan<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#c_Instal_Pembaruan_Keamanan\" >c. Instal Pembaruan Keamanan<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#d_Gunakan_Jaringan_Aman\" >d. Gunakan Jaringan Aman<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#e_Edukasi_Diri_dan_Anggota_Tim\" >e. Edukasi Diri dan Anggota Tim<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#f_Aktifkan_Firewall\" >f. Aktifkan Firewall<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#g_Backup_Data_Secara_Rutin\" >g. Backup Data Secara Rutin<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Apa_yang_Harus_Dilakukan_Jika_Terkena_Malware\" >Apa yang Harus Dilakukan Jika Terkena Malware?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#Kesimpulan\" >Kesimpulan<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Apa_Itu_Malware\"><\/span><strong>Apa Itu Malware?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Malware adalah perangkat lunak berbahaya yang dirancang untuk menyerang perangkat komputer, server, atau jaringan dengan tujuan tertentu, seperti mencuri data, merusak sistem, atau meminta tebusan. Malware sering kali tersembunyi dalam file atau program yang tampak tidak berbahaya, sehingga sulit dikenali oleh pengguna biasa.<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Karakteristik_Malware\"><\/span><strong>Karakteristik Malware:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Merusak:<\/strong> Menghapus atau mengubah data penting.<\/li>\n<li><strong>Mencuri:<\/strong> Mengambil informasi pribadi atau rahasia.<\/li>\n<li><strong>Mengganggu:<\/strong> Membuat sistem lambat atau tidak responsif.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Jenis-Jenis_Malware\"><\/span><strong>Jenis-Jenis Malware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Berikut adalah beberapa jenis malware yang paling umum:<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"a_Virus\"><\/span><strong>a. Virus<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Merupakan malware yang menyisipkan dirinya ke dalam program atau file lain, lalu menyebar saat file tersebut dijalankan. Virus dapat menyebabkan kerusakan data, menghapus file, atau bahkan menghentikan sistem operasi.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Melissa Virus, ILOVEYOU Virus.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Menempel pada file atau program.<\/li>\n<li>Aktif saat file atau program tersebut dijalankan.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"b_Worm\"><\/span><strong>b. Worm<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Adalah malware yang dapat mereplikasi dirinya sendiri tanpa memerlukan file host. Worm menyebar melalui jaringan dan sering menyebabkan konsumsi bandwidth yang tinggi.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Conficker, SQL Slammer.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Menyebar melalui jaringan komputer.<\/li>\n<li>Menargetkan perangkat tanpa patch keamanan terbaru.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"c_Trojan_Horse\"><\/span><strong>c. Trojan Horse<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Trojan adalah malware yang menyamar sebagai aplikasi atau file yang tampak sah. Setelah diunduh, Trojan dapat memberikan akses ke penyerang atau mencuri data pengguna.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Zeus, Emotet.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Disamarkan dalam aplikasi atau file yang menarik.<\/li>\n<li>Menginfeksi perangkat saat diunduh atau dijalankan.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"d_Ransomware\"><\/span><strong>d. Ransomware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Ransomware mengenkripsi data pengguna dan meminta tebusan untuk memulihkan akses. Serangan ransomware sering kali menargetkan bisnis atau organisasi besar.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> WannaCry, Locky.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Masuk melalui lampiran email berbahaya atau unduhan palsu.<\/li>\n<li>Mengenkripsi file dan menampilkan pesan tebusan.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"e_Spyware\"><\/span><strong>e. Spyware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Spyware adalah malware yang dirancang untuk memata-matai aktivitas pengguna, seperti mengumpulkan data login atau riwayat browsing tanpa sepengetahuan mereka.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> FinFisher, CoolWebSearch.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Menginstal secara diam-diam melalui aplikasi atau situs web.<\/li>\n<li>Mengirimkan data pribadi pengguna ke penyerang.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"f_Adware\"><\/span><strong>f. Adware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Adware adalah malware yang menampilkan iklan pop-up yang mengganggu. Beberapa adware juga mengumpulkan data pengguna untuk iklan yang lebih terarah.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Fireball, Gator.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Menampilkan iklan secara terus-menerus.<\/li>\n<li>Mengalihkan pengguna ke situs web tertentu.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"g_Rootkit\"><\/span><strong>g. Rootkit<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Rootkit adalah malware yang memberikan akses tidak sah kepada penyerang untuk mengendalikan perangkat tanpa terdeteksi oleh pengguna.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Stuxnet, NTRootkit.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Menyembunyikan dirinya di dalam sistem.<\/li>\n<li>Memberikan akses penuh kepada penyerang.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"h_Keylogger\"><\/span><strong>h. Keylogger<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Keylogger adalah malware yang merekam setiap ketukan keyboard pengguna untuk mencuri informasi sensitif, seperti kata sandi atau nomor kartu kredit.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Contoh:<\/strong> Revealer Keylogger, Spyrix.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cara Kerja:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Memantau aktivitas keyboard.<\/li>\n<li>Mengirimkan data ke penyerang.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Cara_Menghindari_Malware\"><\/span><strong>Cara Menghindari Malware<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Menghindari malware memerlukan kombinasi kesadaran, kebiasaan aman, dan penggunaan alat perlindungan yang tepat. Berikut adalah langkah-langkah yang dapat diambil:<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"a_Gunakan_Software_Antivirus_Terpercaya\"><\/span><strong>a. Gunakan Software Antivirus Terpercaya<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li>Pilih antivirus yang dapat mendeteksi dan menghapus berbagai jenis malware.<\/li>\n<li>Perbarui antivirus secara berkala untuk memastikan perlindungan terhadap ancaman terbaru.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"b_Hindari_Mengklik_Link_atau_Lampiran_Mencurigakan\"><\/span><strong>b. Hindari Mengklik Link atau Lampiran Mencurigakan<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li>Jangan membuka email dari pengirim yang tidak dikenal.<\/li>\n<li>Verifikasi tautan sebelum mengklik, terutama jika berasal dari sumber yang tidak terpercaya.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"c_Instal_Pembaruan_Keamanan\"><\/span><strong>c. Instal Pembaruan Keamanan<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li>Perbarui sistem operasi dan perangkat lunak Anda secara rutin untuk memperbaiki kerentanan.<\/li>\n<li>Gunakan perangkat lunak asli untuk memastikan keamanan.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"d_Gunakan_Jaringan_Aman\"><\/span><strong>d. Gunakan Jaringan Aman<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li>Hindari menggunakan jaringan Wi-Fi publik untuk transaksi sensitif.<\/li>\n<li>Gunakan VPN untuk melindungi data saat menjelajah internet.<\/li>\n<\/ul>\n<h4><\/h4>\n<h4><span class=\"ez-toc-section\" id=\"e_Edukasi_Diri_dan_Anggota_Tim\"><\/span><strong>e. Edukasi Diri dan Anggota Tim<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<ul>\n<li>Pelajari cara mengenali tanda-tanda malware.<\/li>\n<li>Ajarkan praktik keamanan siber kepada anggota tim atau keluarga.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"f_Aktifkan_Firewall\"><\/span><strong>f. Aktifkan Firewall<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Firewall membantu memblokir lalu lintas mencurigakan yang dapat membawa malware ke perangkat Anda.<\/p>\n<p>&nbsp;<\/p>\n<h4><span class=\"ez-toc-section\" id=\"g_Backup_Data_Secara_Rutin\"><\/span><strong>g. Backup Data Secara Rutin<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<p>Backup data penting secara berkala ke hard drive eksternal atau cloud. Hal ini membantu Anda memulihkan data jika terkena ransomware.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Apa_yang_Harus_Dilakukan_Jika_Terkena_Malware\"><\/span><strong>Apa yang Harus Dilakukan Jika Terkena Malware?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Jika perangkat Anda terinfeksi malware, berikut langkah-langkah yang harus dilakukan:<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong>Putuskan Sambungan Internet:<\/strong> Hal ini mencegah malware menyebar atau mengirim data ke penyerang.<\/li>\n<li><strong>Jalankan Scan Antivirus:<\/strong> Gunakan software antivirus untuk mendeteksi dan menghapus malware.<\/li>\n<li><strong>Hapus File yang Terdeteksi:<\/strong> Ikuti panduan antivirus untuk menghapus file yang terinfeksi.<\/li>\n<li><strong>Pulihkan dari Backup:<\/strong> Jika data rusak atau terenkripsi, pulihkan dari backup yang aman.<\/li>\n<li><strong>Laporkan Insiden:<\/strong> Jika serangan melibatkan data sensitif, laporkan insiden kepada pihak berwenang atau tim IT Anda.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Kesimpulan\"><\/span><strong>Kesimpulan<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>&nbsp;<\/p>\n<p>Malware adalah ancaman yang nyata di dunia digital, tetapi dengan pemahaman yang tepat dan tindakan pencegahan, Anda dapat melindungi perangkat dan data Anda. Memahami jenis-jenis malware seperti virus, ransomware, dan spyware membantu Anda mengenali dan mengatasi ancaman dengan lebih baik.<\/p>\n<p>&nbsp;<\/p>\n<p>Selalu gunakan perangkat lunak keamanan yang kuat, hindari aktivitas online yang berisiko, dan edukasi diri Anda tentang praktik keamanan siber. Dengan langkah-langkah ini, Anda dapat menjaga perangkat dan data Anda tetap aman dari serangan malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dalam era digital yang semakin maju, ancaman siber seperti malware menjadi salah satu risiko utama bagi individu, bisnis, dan organisasi. Malware, singkatan dari malicious software, dirancang untuk merusak, mencuri data, atau mengganggu sistem perangkat Anda. Tanpa perlindungan yang memadai, malware dapat menyebabkan kerugian besar, baik secara finansial maupun reputasi. Artikel ini akan membahas jenis-jenis malware,&hellip; <a class=\"more-link\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/\">Continue reading <span class=\"screen-reader-text\">Jenis-Jenis Malware dan Cara Menghindarinya<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":2255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[25,305],"class_list":["post-2254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it","tag-business","tag-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Jenis-Jenis Malware dan Cara Menghindarinya<\/title>\n<meta name=\"description\" content=\"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jenis-Jenis Malware dan Cara Menghindarinya\" \/>\n<meta property=\"og:description\" content=\"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Nurosoft Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nurosoft\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-03T02:15:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-22T11:31:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"M. Nur Khabibulloh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"M. Nur Khabibulloh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/\"},\"author\":{\"name\":\"M. Nur Khabibulloh\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#\\\/schema\\\/person\\\/9d20aa3d2a752ebcedfcccfaa037dfd0\"},\"headline\":\"Jenis-Jenis Malware dan Cara Menghindarinya\",\"datePublished\":\"2025-01-03T02:15:07+00:00\",\"dateModified\":\"2025-12-22T11:31:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/\"},\"wordCount\":870,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\",\"keywords\":[\"Business\",\"Malware\"],\"articleSection\":[\"IT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/\",\"name\":\"Jenis-Jenis Malware dan Cara Menghindarinya\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\",\"datePublished\":\"2025-01-03T02:15:07+00:00\",\"dateModified\":\"2025-12-22T11:31:06+00:00\",\"description\":\"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/01\\\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg\",\"width\":2560,\"height\":1708,\"caption\":\"jenis-jenis-malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/jenis-jenis-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jenis-Jenis Malware dan Cara Menghindarinya\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/\",\"name\":\"Artikel Seputar Teknologi Informasi, Software, dan Bisnis | Nurosoft\",\"description\":\"Find out anything you want to know about Nurosoft\",\"publisher\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#organization\",\"name\":\"Nurosoft\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/logo.png\",\"width\":1000,\"height\":165,\"caption\":\"Nurosoft\"},\"image\":{\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/nurosoft\\\/\",\"https:\\\/\\\/www.instagram.com\\\/nurosoft\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/nurosoft\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/#\\\/schema\\\/person\\\/9d20aa3d2a752ebcedfcccfaa037dfd0\",\"name\":\"M. Nur Khabibulloh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458\",\"contentUrl\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458\",\"caption\":\"M. Nur Khabibulloh\"},\"description\":\"Mukhammad Nur Khabibulloh adalah seorang profesional digital marketer berpengalaman lebih dari 5 Tahun. Memiliki ketertarikan dalam menulis dengan pembahasan bisnis, teknologi, ERP, HR, transformasi bisnis, Software, SEO, Digital marketing.\",\"url\":\"https:\\\/\\\/nurosoft.id\\\/blog\\\/author\\\/khabib\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Jenis-Jenis Malware dan Cara Menghindarinya","description":"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/","og_locale":"id_ID","og_type":"article","og_title":"Jenis-Jenis Malware dan Cara Menghindarinya","og_description":"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.","og_url":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/","og_site_name":"Nurosoft Blog","article_publisher":"https:\/\/www.facebook.com\/nurosoft\/","article_published_time":"2025-01-03T02:15:07+00:00","article_modified_time":"2025-12-22T11:31:06+00:00","og_image":[{"width":2560,"height":1708,"url":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg","type":"image\/jpeg"}],"author":"M. Nur Khabibulloh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"M. Nur Khabibulloh","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#article","isPartOf":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/"},"author":{"name":"M. Nur Khabibulloh","@id":"https:\/\/nurosoft.id\/blog\/#\/schema\/person\/9d20aa3d2a752ebcedfcccfaa037dfd0"},"headline":"Jenis-Jenis Malware dan Cara Menghindarinya","datePublished":"2025-01-03T02:15:07+00:00","dateModified":"2025-12-22T11:31:06+00:00","mainEntityOfPage":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/"},"wordCount":870,"commentCount":0,"publisher":{"@id":"https:\/\/nurosoft.id\/blog\/#organization"},"image":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg","keywords":["Business","Malware"],"articleSection":["IT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/","url":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/","name":"Jenis-Jenis Malware dan Cara Menghindarinya","isPartOf":{"@id":"https:\/\/nurosoft.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#primaryimage"},"image":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg","datePublished":"2025-01-03T02:15:07+00:00","dateModified":"2025-12-22T11:31:06+00:00","description":"Pelajari jenis-jenis malware seperti virus, trojan, ransomware, dan cara menghindarinya. Temukan cara melindungi perangkat Anda disini.","breadcrumb":{"@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#primaryimage","url":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg","contentUrl":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2025\/01\/unsecured-unavailable-spyware-crash-denied-concept_11zon-scaled.jpg","width":2560,"height":1708,"caption":"jenis-jenis-malware"},{"@type":"BreadcrumbList","@id":"https:\/\/nurosoft.id\/blog\/jenis-jenis-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nurosoft.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Jenis-Jenis Malware dan Cara Menghindarinya"}]},{"@type":"WebSite","@id":"https:\/\/nurosoft.id\/blog\/#website","url":"https:\/\/nurosoft.id\/blog\/","name":"Artikel Seputar Teknologi Informasi, Software, dan Bisnis | Nurosoft","description":"Find out anything you want to know about Nurosoft","publisher":{"@id":"https:\/\/nurosoft.id\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nurosoft.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nurosoft.id\/blog\/#organization","name":"Nurosoft","url":"https:\/\/nurosoft.id\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nurosoft.id\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2022\/10\/logo.png","contentUrl":"https:\/\/nurosoft.id\/blog\/wp-content\/uploads\/2022\/10\/logo.png","width":1000,"height":165,"caption":"Nurosoft"},"image":{"@id":"https:\/\/nurosoft.id\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/nurosoft\/","https:\/\/www.instagram.com\/nurosoft\/","https:\/\/www.linkedin.com\/company\/nurosoft\/"]},{"@type":"Person","@id":"https:\/\/nurosoft.id\/blog\/#\/schema\/person\/9d20aa3d2a752ebcedfcccfaa037dfd0","name":"M. Nur Khabibulloh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nurosoft.id\/blog\/wp-content\/litespeed\/avatar\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458","url":"https:\/\/nurosoft.id\/blog\/wp-content\/litespeed\/avatar\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458","contentUrl":"https:\/\/nurosoft.id\/blog\/wp-content\/litespeed\/avatar\/bff36e2a83a25947b784f116bb4f2f3e.jpg?ver=1778574458","caption":"M. Nur Khabibulloh"},"description":"Mukhammad Nur Khabibulloh adalah seorang profesional digital marketer berpengalaman lebih dari 5 Tahun. Memiliki ketertarikan dalam menulis dengan pembahasan bisnis, teknologi, ERP, HR, transformasi bisnis, Software, SEO, Digital marketing.","url":"https:\/\/nurosoft.id\/blog\/author\/khabib\/"}]}},"_links":{"self":[{"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/posts\/2254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/comments?post=2254"}],"version-history":[{"count":1,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/posts\/2254\/revisions"}],"predecessor-version":[{"id":3987,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/posts\/2254\/revisions\/3987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/media\/2255"}],"wp:attachment":[{"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/media?parent=2254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/categories?post=2254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nurosoft.id\/blog\/wp-json\/wp\/v2\/tags?post=2254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}