{"id":15158,"date":"2024-06-25T06:34:15","date_gmt":"2024-06-25T13:34:15","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=15158"},"modified":"2025-05-26T02:49:09","modified_gmt":"2025-05-26T09:49:09","slug":"protect-yourself-from-vishing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/","title":{"rendered":"How to Protect Yourself from Vishing"},"content":{"rendered":"<p>\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your cell phone.<\/p>\n<h2>Techniques Scammers Use to Get You<\/h2>\n<p>The term is a combination of \u201cvoice,\u201d and \u201c<a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/plenty-of-phish-in-the-sea-your-guide-to-spotting-phishing-emails-and-scams\/\" target=\"_blank\" rel=\"noopener\">phishing<\/a>,\u201d which is the use of spoofed emails to trick targets into clicking malicious links. Rather than email, vishing generally relies on automated phone calls that instruct targets to provide account numbers. Techniques scammers use to get your phone numbers include:<\/p>\n<ul>\n<li><strong>Data Breaches:<\/strong> Scammers often obtain phone numbers from <a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/what-to-do-if-youre-caught-up-in-a-data-breach\/\" target=\"_blank\" rel=\"noopener\">data breaches<\/a> where personal information is exposed and sold on the dark web.<\/li>\n<li><strong>Public Records:<\/strong> Phone numbers can be found in public records, such as court documents, voter registration lists, and property records, which are often accessible online.<\/li>\n<li><strong>Social Media:<\/strong> Many people share their contact information on social media profiles or posts, making it easy for scammers to collect phone numbers.<\/li>\n<li><strong>Online Surveys and Contests:<\/strong> Scammers create fake online surveys or contests that require participants to enter their phone numbers, which are then harvested for vishing.<\/li>\n<li><strong>Dumpster Diving<\/strong>: Physical documents thrown away without shredding, such as old phone bills or bank statements, can provide scammers with phone numbers. Once a visher has the list, he can program the numbers into his system for a more targeted attack.<\/li>\n<li><strong>Wardialing<\/strong>: A visher uses an automated system to target specific area codes with a phone call involving local or regional banks or credit unions. When someone answers the phone a generic or targeted recording begins, requesting that the listener enter a bank account, credit, or debit card number and PIN.<\/li>\n<\/ul>\n<p>Once vishers have phone numbers, they employ various strategies to deceive their targets and obtain valuable personal information:<\/p>\n<ul>\n<li><strong>VoIP<\/strong>: <a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\" target=\"_blank\" rel=\"noopener\">Voice over Internet Protocol (VoIP)<\/a> facilitates vishing by enabling vishers to easily spoof caller IDs, use automated dialing systems, and leverage AI-powered voice manipulation, all while operating from virtually anywhere with an internet connection. This combination of technologies makes it easier for scammers to appear legitimate and efficiently target numerous victims.<\/li>\n<li><strong>Caller ID Spoofing<\/strong>: Caller ID spoofing works by manipulating the caller ID information that appears on the recipient&#8217;s phone, making it seem as though the call is coming from a trusted or local source. Scammers use specialized software or VoIP services to alter the displayed number, which can mimic the number of a reputable institution, such as a bank or government agency.<\/li>\n<li><strong>Social Engineering<\/strong>: In live calls, vishers use <a href=\"https:\/\/www.mcafee.com\/learn\/social-engineering\/?path=blogs\" target=\"_blank\" rel=\"noopener\">social engineering techniques<\/a> to build trust and manipulate the target into divulging personal information. They might pose as customer service representatives, tech support agents, or officials from financial institutions to convince you to hand over personal information.<\/li>\n<li><strong>Voice Manipulation Technology:<\/strong> Advanced <a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-to-protect-yourself-against-ai-voice-cloning-attacks\/\" target=\"_blank\" rel=\"noopener\">AI-powered voice manipulation tools<\/a> can mimic the voices of known individuals or create convincing synthetic voices, adding credibility to the call.<\/li>\n<li><strong>Urgency and Threats:<\/strong> Vishers often create a sense of urgency or fear, claiming immediate action is required to prevent serious consequences, such as account closure, legal action, or financial loss.<\/li>\n<\/ul>\n<p>To protect yourself from vishing scams, you should:<\/p>\n<ul>\n<li><strong>Educate Yourself:<\/strong> Knowledge is the key to defending yourself from vishing. The more you understand it, the better off you\u2019ll be, so read up on vishing incidents. As this crime becomes more sophisticated, you\u2019ll want to stay up to date.<\/li>\n<li><strong>Use Call Blocking Tools:<\/strong> Utilize call blocking and caller ID spoofing detection tools offered by your phone service provider or third-party apps to filter out potential scam calls.<\/li>\n<li><strong>Be Skeptical of Caller ID: <\/strong>With phone spoofing, caller ID is no longer trustworthy. Since caller ID can be tampered with, don\u2019t let it offer a false sense of security.<\/li>\n<li><strong>Do Not Share Personal Information:<\/strong> Never provide personal information, such as Social Security numbers, credit card details, or passwords, to unsolicited callers.<\/li>\n<li><strong>End the Call: <\/strong>If you receive a phone call from a person or a recording requesting personal information, hang up. If the call purports to be coming from a trusted organization, call that entity directly to confirm their request.<\/li>\n<li><strong>Report Suspicious Activity: <\/strong>Call your bank and report any fraud attempts immediately, noting what was said, what information was requested, and, if possible, the phone number or area code of the caller. Also report any suspicious calls to relevant authorities, such as the Federal Trade Commission (FTC), to help prevent others from falling victim to the same scams.<\/li>\n<\/ul>\n<p>Staying vigilant and informed is your best defense against vishing scams. By verifying caller identities, being skeptical of unsolicited requests for personal information, and using call-blocking tools, you can significantly reduce your risk of falling victim to these deceptive practices. Additionally, investing in <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">identity theft protection services<\/a> can provide an extra layer of security. These services monitor your personal information for suspicious activity and offer assistance in recovering from identity theft, giving you peace of mind in an increasingly digital world. Remember, proactive measures and awareness are key to safeguarding your personal information against vishing threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":195273,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,1838],"tags":[37,1814,76,3923,338,142,180,214,2205],"coauthors":[15735],"class_list":["post-15158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-mobile-security","tag-android","tag-computer-security","tag-cybercrime","tag-email-and-web-security","tag-endpoint-protection","tag-tag-identity-theft","tag-malware","tag-mobile-security1","tag-protecting-kids-online"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Yourself from Vishing | McAfee Blog<\/title>\n<meta name=\"description\" content=\"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Yourself from Vishing | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-25T13:34:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T09:49:09+00:00\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Protect Yourself from Vishing\",\"datePublished\":\"2024-06-25T13:34:15+00:00\",\"dateModified\":\"2025-05-26T09:49:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\"},\"wordCount\":854,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png\",\"keywords\":[\"android\",\"computer security\",\"cybercrime\",\"email and web security\",\"endpoint protection\",\"identity theft\",\"malware\",\"mobile security\",\"protecting kids online\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\",\"name\":\"How to Protect Yourself from Vishing | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png\",\"datePublished\":\"2024-06-25T13:34:15+00:00\",\"dateModified\":\"2025-05-26T09:49:09+00:00\",\"description\":\"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protect Yourself from Vishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Yourself from Vishing | McAfee Blog","description":"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Protect Yourself from Vishing | McAfee Blog","og_description":"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-06-25T13:34:15+00:00","article_modified_time":"2025-05-26T09:49:09+00:00","author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Protect Yourself from Vishing","datePublished":"2024-06-25T13:34:15+00:00","dateModified":"2025-05-26T09:49:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/"},"wordCount":854,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png","keywords":["android","computer security","cybercrime","email and web security","endpoint protection","identity theft","malware","mobile security","protecting kids online"],"articleSection":["How To Guides and Tutorials","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/","name":"How to Protect Yourself from Vishing | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png","datePublished":"2024-06-25T13:34:15+00:00","dateModified":"2025-05-26T09:49:09+00:00","description":"\u201cVishing\u201d occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2012\/03\/300x200_Blog_062524.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/protect-yourself-from-vishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"Protect Yourself from Vishing"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/15158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=15158"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/15158\/revisions"}],"predecessor-version":[{"id":214320,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/15158\/revisions\/214320"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/195273"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=15158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=15158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=15158"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=15158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}