{"id":114,"name":"Jason Davison","url":"","description":"Jason is a Malware Threat Researcher, investigating the latest techniques used in modern malware. Working for Webroot, he researches and reverses the latest malware families identifying new functionality and TTP's.","link":"https://www.webroot.com/blog/author\/jdavison\/","slug":"jdavison","avatar_urls":{"24":"http:\/\/1.gravatar.com\/avatar\/49079213e9cc5c890c369bf99b936d2f?s=24&d=mm&r=g","48":"http:\/\/1.gravatar.com\/avatar\/49079213e9cc5c890c369bf99b936d2f?s=48&d=mm&r=g","96":"http:\/\/1.gravatar.com\/avatar\/49079213e9cc5c890c369bf99b936d2f?s=96&d=mm&r=g"},"meta":[],"acf":[],"simple_local_avatar":{"full":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208.jpg","96":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208.jpg","90":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208.jpg","32":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208.jpg","180":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208-180x180.jpg","64":"https://www.webroot.com/blog/wp-content\/uploads\/2018\/05\/Jason-Davison_avatar_1525473208-64x64.jpg"},"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/114"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users"}]}}