{"id":116149,"date":"2021-01-15T10:58:49","date_gmt":"2021-01-15T18:58:49","guid":{"rendered":"\/blogs\/?p=116149"},"modified":"2024-02-20T18:31:54","modified_gmt":"2024-02-21T02:31:54","slug":"two-pink-lines","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/","title":{"rendered":"Two Pink Lines"},"content":{"rendered":"<p>Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I suspect, like many fathers and expecting fathers, I will never forget the moment I found out my wife was pregnant.\u00a0 You might recall what you were doing, or where you were and maybe even what you were thinking.\u00a0\u00a0 As a professional ethical hacker, I have been told many times \u2013 \u201cYou just think a little differently about things.\u201d\u00a0\u00a0 I sure hope so, since that\u2019s my day job and sure enough this experience wasn\u2019t any different.\u00a0 My brain immediately asked the question, \u201cHow am I going to ensure my family is protected from a wide range of cyberthreats?\u201d\u00a0\u00a0 Having a newborn opens the door to all sorts of new technology and I would be a fool not to take advantage of all devices that makes parenting easier. \u00a0\u00a0So how do we do this safely?<\/p>\n<h2>The A-B -C \u2018s<\/h2>\n<p>The security industry has a well-known concept called the \u201cprinciple of least privilege. \u201cThis simply means that you don\u2019t give a piece of technology more permissions or access than it needs to perform its primary function. \u00a0\u00a0This can be applied well beyond just technology that helps parents; however, for me it&#8217;s of extra importance when we talk about our kids.\u00a0 One of the parenting classes I took preparing for our newborn suggested we use a baby tracking phone app.\u00a0\u00a0 This was an excellent idea, since I hate keeping track of anything on paper.\u00a0 So I started looking at a few different apps for my phone and discovered one of them asked for permission to use \u201clocation services,\u201d also known as GPS, along with access to my phone contacts.\u00a0 This caused me to pause and ask: Why does an app to track my baby\u2019s feeding schedule need to know where I am?\u00a0 Why does it need to know who my friends are?\u00a0\u00a0 These are the types of questions parents should consider before just jumping into the hottest new app.\u00a0 For me, I found a different, less popular app which has the same features, just with a little less access.<\/p>\n<p>It&#8217;s not always as easy to just \u201cfind something else.\u201d\u00a0 In my house, \u201cif momma ain\u2019t happy, nobody is happy.\u201d\u00a0 So, when my wife decided on a specific breast pump that came with Bluetooth and is internet enabled, that\u2019s the one she is going to use.\u00a0\u00a0 The app backs up all the usage data to a server in the cloud.\u00a0\u00a0 There are many ways that this can be accomplished securely, and it is not necessary a bad feature, but I didn\u2019t feel this device benefited from being internet connected.\u00a0\u00a0 Therefore, I simply lowered its privileges by not allowing it internet access in the settings on her phone.\u00a0 The device works perfectly fine, she can show the doctor the data from her phone, yet we have limited our online exposure and footprint just a little more.\u00a0 This simple concept of least privilege can be applied almost everywhere and goes a long way to limiting your exposure to cyber threats.<\/p>\n<h2>Peek-A-Boo<\/h2>\n<p>I think one of the most sought after and used products for new parents is the baby monitor or baby camera.\u00a0\u00a0 As someone who has spent a fair amount of time hacking cameras <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/robot-character-analysis-reveals-trust-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\">(or cameras on wheels)<\/a> this was a large area of concern for me.\u00a0 Most cameras these days are internet connected and if not, you often lose the ability to view the feed on your phone, which is a huge benefit to parents.\u00a0 So how, as parents, do we navigate this securely?\u00a0 While there is no silver bullet here, there are a few things to consider.\u00a0 \u00a0\u00a0For starters, there are still many baby cameras on the market that come with their own independent video screen.\u00a0 They generally use Wi-Fi and are only accessible from home.\u00a0 If this system works for you, use it.\u00a0 It is always more secure to have a video system which is not externally accessible. \u00a0\u00a0If you really want to be able to use your phone, consider the below.<\/p>\n<ul>\n<li><strong>Where is the recorded video and audio data being stored? <\/strong>This may not seem important if the device is internet connected anyway, but it can be.\u00a0 If your camera data is being stored locally (DVR, SD card, network storage, etc.), then an attacker would need to hack your specific device to obtain this information. \u00a0\u00a0If you combine this with good security hygiene such as a strong password and keeping your device updated, an attacker has to work very hard to access your camera data.\u00a0 If we look at the alternative where your footage is stored in the cloud, and it becomes subject to a security breach, now your camera\u2019s video content is collateral damage.\u00a0 Large corporations are specifically targeted by cybercriminals because they provide a high ROI for the time spent on the attack; an individual practicing good cybersecurity hygiene becomes a much more difficult target providing less incentive for the attacker, thus becoming a less likely target.<\/li>\n<li><strong>Is the camera on the same network as the rest of your home? <\/strong>An often-overlooked security implication to many IoT devices, but especially cameras, is outside of the threat of spying, but rather the threat of a network entry point. If the camera itself is compromised it can be used as a pivot point to attack other devices on your network. \u00a0A simple way to reduce this risk is to utilize the \u201cguest\u201d network feature that comes by default on almost all home routers.\u00a0\u00a0 These guest networks are preset to be isolated from your main network and generally require little to no setup.\u00a0 By simply attaching your cameras to your guest network, you can reduce the risk of a compromised camera leading a cybercriminal to the banking info on your laptop.<\/li>\n<\/ul>\n<h2>Background checks \u2013 Not only for babysitters<\/h2>\n<p>Most parents, especially new ones, like to ensure that anyone that watches their children is thoroughly vetted. \u00a0There are a ton of services out there to do this for babysitters and nannies, however it\u2019s not always as easy for vetting the companies that create the devices we put in our homes.\u00a0 So how do we determine what is safe?\u00a0 My father used to tell me: \u201cIt\u2019s how we respond to our mistakes that makes the difference.\u201d \u00a0When researching a company or device, should you find that the device has been found to have a vulnerability, often the response time and accountability from the vendor can tell you if it\u2019s a company you should be investing in. Some things to look for include:<\/p>\n<ul>\n<li>Was the vulnerability quickly patched?<\/li>\n<li>Are there unpatched bugs still?<\/li>\n<li>Has a vendor self-reported flaws, fixed them and reported to the public they have been fixed?<\/li>\n<li>Are there numerous outstanding bugs filed against a company or device?<\/li>\n<li>Does the company not recognize the possibility of bugs in their products?<\/li>\n<\/ul>\n<p>These answers can often be discovered on a company\u2019s website or in release notes, which are generally attached to an update of a piece of software.\u00a0\u00a0 Take a minute to read the notes and see if the company is making security updates. You don\u2019t need to understand all the details, just knowing they take security seriously enough to update frequently is important.\u00a0 This can help tip the scales when deciding between devices or apps.<\/p>\n<h2>Remember, you can do this!<\/h2>\n<p>Through my preparation for becoming a new parent, I constantly read in books and was told by professionals, \u201cRemember, you can do this!\u201d \u00a0Cybersecurity in the context of being a parent is no different.\u00a0 Every situation is different, and it is important to do what works with you and your family.\u00a0 As parents, we shouldn\u2019t be afraid to use all the cool new gadgets that are emerging on the market, but instead educate ourselves on how to limit our risk.\u00a0 Which features do I need, which ones can I do without?\u00a0 \u00a0Remember always follow a vendor\u2019s recommendations and best practices, and of course remember to breathe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a&#8230;<\/p>\n","protected":false},"author":892,"featured_media":95241,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4927],"class_list":["post-116149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Two Pink Lines | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two Pink Lines | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-15T18:58:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-21T02:31:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Douglas McKee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fulmetalpackets\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Douglas McKee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\"},\"author\":{\"name\":\"Douglas McKee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb\"},\"headline\":\"Two Pink Lines\",\"datePublished\":\"2021-01-15T18:58:49+00:00\",\"dateModified\":\"2024-02-21T02:31:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\"},\"wordCount\":1354,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\",\"name\":\"Two Pink Lines | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png\",\"datePublished\":\"2021-01-15T18:58:49+00:00\",\"dateModified\":\"2024-02-21T02:31:54+00:00\",\"description\":\"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png\",\"width\":900,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Two Pink Lines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb\",\"name\":\"Douglas McKee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e54e5d329578bf9389cb75beac2b6471\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg\",\"caption\":\"Douglas McKee\"},\"description\":\"Douglas McKee is a Principal Engineer and Senior Security Researcher for the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Douglas has an extensive background in vulnerability research, penetration testing, reverse engineering, malware analysis, and forensics and throughout his career has provided software exploitation training to many audiences, including law enforcement. Doug is a regular speaker at industry conferences such as DEF CON and his research is regularly featured in publications with broad readership including Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/douglas-mckee-77460677\/\",\"https:\/\/x.com\/fulmetalpackets\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/douglas-mckee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Two Pink Lines | McAfee Blog","description":"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Two Pink Lines | McAfee Blog","og_description":"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-01-15T18:58:49+00:00","article_modified_time":"2024-02-21T02:31:54+00:00","og_image":[{"width":900,"height":900,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png","type":"image\/png"}],"author":"Douglas McKee","twitter_card":"summary_large_image","twitter_creator":"@fulmetalpackets","twitter_site":"@McAfee","twitter_misc":{"Written by":"Douglas McKee","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/"},"author":{"name":"Douglas McKee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb"},"headline":"Two Pink Lines","datePublished":"2021-01-15T18:58:49+00:00","dateModified":"2024-02-21T02:31:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/"},"wordCount":1354,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/","name":"Two Pink Lines | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png","datePublished":"2021-01-15T18:58:49+00:00","dateModified":"2024-02-21T02:31:54+00:00","description":"Depending on your life experiences, the phrase (or country song by Eric Church) \u201ctwo pink lines\u201d may bring up a wide range of powerful emotions.\u00a0\u00a0\u00a0 I","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/EP.png","width":900,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/two-pink-lines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Two Pink Lines"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/7258a70ccfed80c87deb0ff79eee1ffb","name":"Douglas McKee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e54e5d329578bf9389cb75beac2b6471","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/Douglas-01-5x5-96x96.jpg","caption":"Douglas McKee"},"description":"Douglas McKee is a Principal Engineer and Senior Security Researcher for the Advanced Threat Research team, focused on finding new vulnerabilities in both software and hardware. Douglas has an extensive background in vulnerability research, penetration testing, reverse engineering, malware analysis, and forensics and throughout his career has provided software exploitation training to many audiences, including law enforcement. Doug is a regular speaker at industry conferences such as DEF CON and his research is regularly featured in publications with broad readership including Politico, Bleeping Computer, Security Boulevard, Venture Beat, CSO, Politico Morning eHealth, Tech Republic, and Axios.","sameAs":["https:\/\/www.linkedin.com\/in\/douglas-mckee-77460677\/","https:\/\/x.com\/fulmetalpackets"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/douglas-mckee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/116149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/892"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=116149"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/116149\/revisions"}],"predecessor-version":[{"id":183353,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/116149\/revisions\/183353"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95241"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=116149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=116149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=116149"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=116149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}