{"id":13141,"date":"2011-12-28T09:56:41","date_gmt":"2011-12-28T17:56:41","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=13141"},"modified":"2025-06-01T23:23:53","modified_gmt":"2025-06-02T06:23:53","slug":"fighting-mobile-phone-impersonation-and-surveillance","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/","title":{"rendered":"Fighting Mobile Phone Impersonation and Surveillance"},"content":{"rendered":"<p>Yesterday at the <a title=\"28th Chaos Communications Congress\" href=\"http:\/\/events.ccc.de\/congress\/2011\/wiki\/Welcome\">28th Chaos Communications Congress (28C3),<\/a> in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of flaws and solutions in GSM mobile phone networks.<\/p>\n<figure id=\"attachment_13147\" aria-describedby=\"caption-attachment-13147\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=13147\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-13147\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png\" alt=\"\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1.png 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-13147\" class=\"wp-caption-text\">Karsten Nohl presenting \u201cDefending Mobile Phones\u201d at the 28th Chaos Communications Congress.<\/figcaption><\/figure>\n<h2><strong>Day 1<\/strong><\/h2>\n<p>Defeating GSM encryption is not new. Nohl and Melette detailed how attackers can use known network control messages to help decrypt SMS traffic and recover the <a title=\"Temporary Mobile Subscriber Identity\" href=\"http:\/\/en.wikipedia.org\/wiki\/Mobility_management#TMSI\">TMSI,<\/a> a temporary ID assigned to every device on the network. Acquiring a TMSI lets an attacker pretend to be the victim&#8217;s mobile phone. This is useful for signing up somebody&#8217;s phone for SMS subscription services or other premium-rate SMS fraud.<\/p>\n<figure id=\"attachment_13151\" aria-describedby=\"caption-attachment-13151\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/securingtomorrow.mcafee.com\/?attachment_id=13151\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-13151\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-2-300x180.png\" alt=\"\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-2-300x180.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-2.png 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-13151\" class=\"wp-caption-text\">Impersonating mobile phones makes SMS fraud easier for attackers.<\/figcaption><\/figure>\n<p>Mitigating the attack requires mobile networks to implement certain techniques that prevent the encrypting of known messages, avoiding known plain-text attacks. Making the changes can require new GSM network hardware, which carriers may have to delay due to expense.<\/p>\n<p>The duo also mentioned how the use of IMSI catchers&#8211;monitoring devices used by law enforcement&#8211;by criminals is leaving mobile users at risk.\u00a0Crooks can now attain relatively cheaply the same hardware tools that police use to emulate cell towers.<\/p>\n<p>An additional technique used to locate mobile phones is the so-called Silent SMS. These messages are silently ignored by the majority of mobile phones and give no indication to the user.\u00a0But the messages leave trails in customer service records, the logs kept by mobile carriers, and allow monitors to correlate a mobile phone&#8217;s location with that of cell towers.<\/p>\n<p>Our presenters have developed free software, CatcherCatcher, which detects features used by IMSI catchers that regular cell towers don&#8217;t use. The <a title=\"GSM Secuirty map\" href=\"http:\/\/gsmmap.org\/\">GSM security map,<\/a> a site that uses data from the CatcherCatcher tool, helps to track unauthorized mobile phone monitoring.<\/p>\n<h2><strong>Day 2<\/strong><\/h2>\n<p>Today promises additional talks on mobile security, <a title=\"Apple vs. Google Client Platforms\" href=\"http:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/events\/4676.en.html\">&#8220;Apple vs. Google Client Platform,&#8221;<\/a> and <a title=\"Reverse-engineering a Qualcomm baseband\" href=\"http:\/\/events.ccc.de\/congress\/2011\/Fahrplan\/events\/4735.en.html\">&#8220;Reversing a Qualcomm baseband.&#8221;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,214],"coauthors":[3973],"class_list":["post-13141","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-28T17:56:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T06:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Fighting Mobile Phone Impersonation and Surveillance\",\"datePublished\":\"2011-12-28T17:56:41+00:00\",\"dateModified\":\"2025-06-02T06:23:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\"},\"wordCount\":340,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png\",\"keywords\":[\"computer security\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\",\"name\":\"Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png\",\"datePublished\":\"2011-12-28T17:56:41+00:00\",\"dateModified\":\"2025-06-02T06:23:53+00:00\",\"description\":\"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Fighting Mobile Phone Impersonation and Surveillance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog","description":"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog","og_description":"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2011-12-28T17:56:41+00:00","article_modified_time":"2025-06-02T06:23:53+00:00","og_image":[{"width":480,"height":288,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Fighting Mobile Phone Impersonation and Surveillance","datePublished":"2011-12-28T17:56:41+00:00","dateModified":"2025-06-02T06:23:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/"},"wordCount":340,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png","keywords":["computer security","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/","name":"Fighting Mobile Phone Impersonation and Surveillance | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png","datePublished":"2011-12-28T17:56:41+00:00","dateModified":"2025-06-02T06:23:53+00:00","description":"Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased a number of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2011\/12\/Screenshot-27.12-2145_Defending_mobile_phones.m4v-1-300x180.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-mobile-phone-impersonation-and-surveillance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Fighting Mobile Phone Impersonation and Surveillance"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/13141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=13141"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/13141\/revisions"}],"predecessor-version":[{"id":214772,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/13141\/revisions\/214772"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=13141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=13141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=13141"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=13141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}