{"id":154303,"date":"2022-06-08T06:02:10","date_gmt":"2022-06-08T13:02:10","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=154303"},"modified":"2024-01-24T18:27:52","modified_gmt":"2024-01-25T02:27:52","slug":"wedding-planning-app-users-hacked-before-the-big-day","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/","title":{"rendered":"Wedding Planning App Users Hacked Before the Big Day"},"content":{"rendered":"<p><span data-contrast=\"auto\">Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and everything is running smoothly. You\u2019ve used a trusty wedding planning website to make everything a breeze. Nothing could ruin this day for you! Except, there\u2019s an uninvited guest. They\u2019re not crashing the wedding and making an awkward toast, but they\u2019ve crashed into your wedding planning website account and now have access to your information. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There are many things that could go wrong during wedding planning \u2013 some of them out of anyone\u2019s control. Maybe the caterer canceled last minute, or the live band is stuck in traffic. Other things may be easily avoided, but you don\u2019t necessarily see them coming. Like a hacker accessing your wedding website and making fraudulent bank transfers right before your big day.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">The Wedding Crasher<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Zola, a wedding planning site allowing couples to create websites, budgets, and gift registries, confirmed that hackers had managed to access the accounts of some of their users,\u00a0<\/span><a href=\"https:\/\/www.theverge.com\/2022\/5\/23\/23137944\/zola-wedding-hack-gift-card-fraudulent-transfer\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">The Verge<\/span><\/a><span data-contrast=\"auto\"> reported. Once these accounts were infiltrated, hackers used the linked bank accounts or funds held inside the site to make cash transfers. The main method these cybercriminals used was purchasing gift cards through the user\u2019s account and sending them to their email addresses to avoid being easily traced.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These criminals did not hack the Zola website itself but hacked their users\u2019 accounts with a method called credential stuffing. This is a strategy where hackers take email and password combinations involved in previous breaches of other websites and use them to log into other online profiles.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">You may not even know that your information had been breached previously and that cybercriminals now had your logins for a number of different accounts. Luckily, there are ways to protect yourself and your information from credential stuffing tactics to stop hackers in their tracks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Tell Credential Stuffing to Go Stuff It<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Just because you\u2019ve hypothetically grown up and are ready for lifelong commitments doesn\u2019t mean you\u2019ve outgrown those old trusty email addresses and passwords (hello, \u201cbasketball4life23\u201d). There\u2019s a level of nostalgia that comes with using the email account that you made in middle school, or maybe you just haven\u2019t gotten around to changing it. However, keeping those old email addresses and logins are doing you more harm than good. Want to make sure that hackers aren\u2019t able to credential stuff your accounts? Here are some trusty tips to keep your information safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Track down and close old accounts<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The best way to know that your <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/dont-let-old-accounts-haunt-you\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">old accounts aren\u2019t coming back to haunt you<\/span><\/a><span data-contrast=\"auto\"> is to make sure those ancient logins are dead and gone. If you don\u2019t remember all the accounts you\u2019ve made and no longer use, don\u2019t sweat it! There are settings through your internet browser that will show you all the accounts and passwords you have saved. A <\/span><a href=\"https:\/\/www.truekey.com\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">password manager<\/span><\/a><span data-contrast=\"auto\"> also keeps track of all your credentials, so you don\u2019t have to wrack your brain to try and remember every account you\u2019ve ever made. Once you\u2019ve gone through all your old online accounts you no longer use, close them for good! Though this step will require some time and patience, it\u2019s always better to put in the effort and know your information is safe than to risk it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Create strong and unique passwords<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Only having to remember one password for every account may make logging in easier, but ensuring that each of your accounts is unique and secure is worth the extra effort. Having a strong and unique password for each of your accounts helps protect them from credential stuffing and other threats. Varying your passwords across online accounts will assure you that if one of them is breached, the others will remain safe. A password manager can also help with this step, because many of them, such as <\/span><a href=\"http:\/\/true%20key\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">True Key<\/span><\/a><span data-contrast=\"auto\">, can generate strong, random, and unique passwords for every account.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Update credentials when necessary<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Keep an eye out to make sure that if a website or company you have an account with is breached, you are updating your credentials so that hackers can\u2019t access them. If you see that there has been a hack and your information is vulnerable, immediately update your logins and passwords on that account to keep yourself safe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h3><b><span data-contrast=\"auto\">Use multifactor authentication<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Using <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/authentication-methods-101\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">multifactor authentication<\/span><\/a><span data-contrast=\"auto\"> adds an extra layer of protection to your accounts. This safety measure requires more than one method of identity verification to access the account, helping to prevent criminals from gaining access to your password-protected information. \u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Don\u2019t let cybercriminals get the jump on you! Take the necessary steps to protect your accounts and your personal information. Though combing through your old accounts and deleting them or coming up with a new and unique password for every site login isn\u2019t a glamourous activity, you\u2019ll enjoy greater peace of mind that your accounts are safe, leaving you free to enjoy life\u2019s best moments. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to&#8230;<\/p>\n","protected":false},"author":674,"featured_media":154318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[4185,15252,15251,15250],"coauthors":[3973],"class_list":["post-154303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-phishing","tag-phishing-hack","tag-wedding-planning","tag-wedding-planning-app-hacked"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wedding Planning App Users Hacked Before the Big Day | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wedding Planning App Users Hacked Before the Big Day | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-08T13:02:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-25T02:27:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Wedding Planning App Users Hacked Before the Big Day\",\"datePublished\":\"2022-06-08T13:02:10+00:00\",\"dateModified\":\"2024-01-25T02:27:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg\",\"keywords\":[\"Phishing\",\"phishing hack\",\"wedding planning\",\"wedding planning app hacked\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\",\"name\":\"Wedding Planning App Users Hacked Before the Big Day | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg\",\"datePublished\":\"2022-06-08T13:02:10+00:00\",\"dateModified\":\"2024-01-25T02:27:52+00:00\",\"description\":\"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Wedding Planning App Users Hacked Before the Big Day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wedding Planning App Users Hacked Before the Big Day | McAfee Blog","description":"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Wedding Planning App Users Hacked Before the Big Day | McAfee Blog","og_description":"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-06-08T13:02:10+00:00","article_modified_time":"2024-01-25T02:27:52+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Wedding Planning App Users Hacked Before the Big Day","datePublished":"2022-06-08T13:02:10+00:00","dateModified":"2024-01-25T02:27:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/"},"wordCount":858,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg","keywords":["Phishing","phishing hack","wedding planning","wedding planning app hacked"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/","name":"Wedding Planning App Users Hacked Before the Big Day | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg","datePublished":"2022-06-08T13:02:10+00:00","dateModified":"2024-01-25T02:27:52+00:00","description":"Say you\u2019re getting married. You and your partner have booked the venue, made the seating arrangements, trained your dog to be the ring bearer \u2013 and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/06\/300x200_Blog_weddingplanningapp.jpg","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/wedding-planning-app-users-hacked-before-the-big-day\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Wedding Planning App Users Hacked Before the Big Day"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=154303"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154303\/revisions"}],"predecessor-version":[{"id":181216,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/154303\/revisions\/181216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154318"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=154303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=154303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=154303"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=154303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}