{"id":133006,"date":"2021-12-10T18:35:47","date_gmt":"2021-12-11T02:35:47","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=133006"},"modified":"2024-02-21T23:46:52","modified_gmt":"2024-02-22T07:46:52","slug":"concerned-by-the-security-risk-affecting-popular-services-and-apps","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/","title":{"rendered":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know."},"content":{"rendered":"<p><span data-contrast=\"none\">Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites, services,\u00a0hosted\u00a0apps, and even\u00a0game\u00a0servers\u2014thanks to an apparent\u00a0flaw\u00a0that could allow hackers to\u00a0compromise or\u00a0take control of servers\u00a0that run\u00a0them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u00a0Just as reported\u00a0by the developers of the popular Minecraft game, this\u00a0flaw\u00a0potentially affects servers\u00a0that run\u00a0Twitter, Apple\u2019s iCloud,\u00a0the\u00a0Steam gaming\u00a0platform,\u00a0and a\u00a0growing number of others\u00a0that may be vulnerable.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">One research group has dubbed the vulnerability as \u201cLog4Shell,\u201d<\/span><\/a><span data-contrast=\"none\"> and the name appears to be sticking. It involves\u00a0a\u00a0widely\u00a0used\u00a0software\u00a0used to log\u00a0information on servers.\u00a0This\u00a0software\u00a0is open source, meaning it is freely available to\u00a0developers. As\u00a0a\u00a0result,\u00a0\u00a0countless\u00a0organizations\u00a0and businesses\u00a0use it on their servers.\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">While details are still evolving,\u00a0researchers are acting\u00a0with a proper degree\u00a0of caution\u00a0given the\u00a0potential scope\u00a0of the issue.\u00a0Needless to say,\u00a0the\u00a0immediate level of\u00a0concern\u00a0remains high given the\u00a0potential of\u00a0the\u00a0flaw\u00a0to\u00a0impact millions of servers, devices, and the people who use them.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">What can an attacker do with this vulnerability? <\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">At this early stage, a few things appear to be possible:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">A hacker could access the logs on\u00a0impacted\u00a0servers, gathering the information kept there. This could include any kind of information from chats, usernames, passwords, or other information, depending on what\u2019s being\u00a0logged\u00a0by the website, app, or service in question.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">In some instances, the vulnerability reportedly allows hackers to execute code or functions that can compromise or even take over the targeted server. For example, there have been\u00a0<\/span><a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1469322120840708100?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1469322120840708100%7Ctwgr%5E%7Ctwcon%5Es1_&amp;ref_url=https%3A%2F%2Fwww.tenable.com%2Fblog%2Fcve-2021-44228-proof-of-concept-for-critical-apache-log4j-remote-code-execution-vulnerability\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">reports<\/span><\/a><span data-contrast=\"none\">\u00a0of compromised servers that were converted to illicitly mine for cryptocurrencies.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Likewise, there is the potential for hackers to further use\u00a0the impacted\u00a0servers to distribute malware to the computers, smartphones, and other devices connected to\u00a0them.\u00a0As of this writing, we have yet to uncover any such attacks. However,\u00a0determined hackers could attempt such an attack if they believe there\u2019s some value or return in doing so.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><b><span data-contrast=\"auto\">What if I know someone who plays Minecraft or is running a Minecraft server?<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">The developers of Minecraft have provided several steps that detail\u00a0what\u00a0both players and server hosts should\u00a0do\u00a0to protect themselves. The developers clearly recognize the potential gravity of the situation\u00a0and are taking a proactive approach\u00a0in saying, \u201cThis vulnerability poses a potential risk of your computer being compromised, and while this exploit has been addressed with all versions of the game client patched, you still need to take\u00a0[steps]\u00a0to secure your game and your servers.\u201d We\u2019ve provided the link\u00a0to those steps\u00a0here:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00a0<\/span><a href=\"https:\/\/www.minecraft.net\/en-us\/article\/important-message--security-vulnerability-java-edition\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Recommended steps for Minecraft players and server hosts.<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">How else you can protect yourself<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"none\">Right now, as this situation evolves, the best step is to keep your eyes open. If the app, service, site, or game you\u2019re on performs strangely,\u00a0consider signing out and closing it\u00a0down.\u00a0Then,\u00a0perform\u00a0a security\u00a0scan\u00a0on\u00a0your device to\u00a0check\u00a0for\u00a0viruses,\u00a0malware, or other threats.\u00a0Follow the guidance from your online\u00a0protection software\u00a0if any results come up.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">You may also consider limiting your\u00a0app and\u00a0service usage to\u00a0the most important\u00a0activities.\u00a0If\u00a0it\u2019s not\u00a0an\u00a0urgent\u00a0or\u00a0important online task\u00a0or\u00a0activity, see about putting it\u00a0off\u00a0until more is known.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Likewise, stay tuned.\u00a0The details around this vulnerability\u00a0continue to unfold.\u00a0As they\u00a0do, you\u2019ll\u00a0find further guidance\u00a0that can help keep\u00a0you and your family\u00a0protected from this\u00a0or any follow-on\u00a0threats associated with this issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:257}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites, services,\u00a0hosted\u00a0apps, and even\u00a0game\u00a0servers\u2014thanks to an apparent\u00a0flaw\u00a0that could&#8230;<\/p>\n","protected":false},"author":674,"featured_media":133009,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667],"tags":[4145],"coauthors":[3973],"class_list":["post-133006","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","tag-data-breach"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-11T02:35:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-22T07:46:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know.\",\"datePublished\":\"2021-12-11T02:35:47+00:00\",\"dateModified\":\"2024-02-22T07:46:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\"},\"wordCount\":608,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"keywords\":[\"Data Breach\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\",\"name\":\"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"datePublished\":\"2021-12-11T02:35:47+00:00\",\"dateModified\":\"2024-02-22T07:46:52+00:00\",\"description\":\"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg\",\"width\":300,\"height\":200,\"caption\":\"Leaked data, data breach, cybersecurity and hacked stolen data concepts. Hand with magnet steal data from unprotected computer, visual metaphor and concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/security-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog","description":"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog","og_description":"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,","og_url":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-12-11T02:35:47+00:00","article_modified_time":"2024-02-22T07:46:52+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know.","datePublished":"2021-12-11T02:35:47+00:00","dateModified":"2024-02-22T07:46:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/"},"wordCount":608,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","keywords":["Data Breach"],"articleSection":["Security News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/","url":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/","name":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know. | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","datePublished":"2021-12-11T02:35:47+00:00","dateModified":"2024-02-22T07:46:52+00:00","description":"Several security researchers have\u00a0recently reported a powerful\u00a0software\u00a0bug that could potentially affect thousands\u00a0of\u00a0popular websites,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/RR-M-300x200-1.jpeg","width":300,"height":200,"caption":"Leaked data, data breach, cybersecurity and hacked stolen data concepts. Hand with magnet steal data from unprotected computer, visual metaphor and concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/security-news\/concerned-by-the-security-risk-affecting-popular-services-and-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Security News","item":"https:\/\/www.mcafee.com\/blogs\/security-news\/"},{"@type":"ListItem","position":3,"name":"Concerned by the Security Risk Affecting Popular Services and Apps? Here\u2019s What We Know."}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/133006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=133006"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/133006\/revisions"}],"predecessor-version":[{"id":183810,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/133006\/revisions\/183810"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/133009"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=133006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=133006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=133006"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=133006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}