{"id":21351,"date":"2013-01-18T10:35:21","date_gmt":"2013-01-18T18:35:21","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=21351"},"modified":"2025-06-06T01:35:51","modified_gmt":"2025-06-06T08:35:51","slug":"the-future-of-hacktivism-and-anonymous","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/","title":{"rendered":"The Future of Hacktivism and Anonymous"},"content":{"rendered":"<p>After the publication of the <em>2013 Threats Predictions<\/em> from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in Anonymous activity this year. Some readers agreed, while others were more skeptical. With this blog, I will attempt to explain these positions.<\/p>\n<h2><span style=\"text-decoration: underline;\">The Anonymous signature<\/span><\/h2>\n<p>Today, many people use the Anonymous banner. It is more and more difficult to identify the true actors of this brand of hacktivism. In the following image (which appears to be from a French maker of false papers: \u201ccertified counterfeiter\/fake document wholesaler\u201d), we see the Anonymous logo used by cybercriminals.<\/p>\n<p style=\"text-align: left;\">&#8220;Anonymous&#8221; also appeared with a bomb threat on November 5, 2012. Last February, we saw an attempt to extort US$50,000 from Symantec by Yamatough, a hacker claiming sympathy for Anonymous and Antisec. Some researchers were very suspicious regarding the real motivation.<\/p>\n<p>Consequently, some researchers claim Anonymous is now an universal banner for all kind of campaigns to misinform and brainwash, and with its image damaged its notoriety will decline. On the other hand, other researchers say that with #OpWCIT, #WBC, #SandyShooting, and #AaronSwartz, Anonymous has become even more visible.<\/p>\n<h2><span style=\"text-decoration: underline;\">Disinformation?<\/span><\/h2>\n<p>In 2012 we noted various alleged Anonymous operations that were not just unclear but fake. On November 5t Anonymous threatened Facebook and Zynga; nothing serious occurred. In September, a tweet claimed attack responsibility after GoDaddy was unable to serve millions of websites hosted on its servers. The failure was in fact caused by a series of internal network events that corrupted router data tables. The same month, Antisec claimed to have stolen 12 million Apple device identifiers from a computer of an FBI agent. In fact, this data came from the app-publishing company<a href=\"http:\/\/redtape.nbcnews.com\/_news\/2012\/09\/10\/13781440-exclusive-the-real-source-of-apple-device-ids-leaked-by-anonymous-last-week\"> BlueToad<\/a>.<\/p>\n<p>Some say Anonymous is eroding its credibility with such efforts. For example, they point the finger at @AnonymousOwn3r, who likes to spread such misinformation. Others are more cautious, wondering, for example, if they can believe BlueToad.<\/p>\n<h2><span style=\"text-decoration: underline;\">Confused or uncoordinated actions?<\/span><\/h2>\n<p>December was announced as the month of a leak of \u201can unprecedented amount\u201d of data (Project Mayhem). In the fourth quarter, YouTube became saturated with hundreds of Project Mayhem&#8217;s call-to-action videos, mainly appealing to those who wanted to expose corruption and\/or to support the hacktivist cause. As reported by the <a href=\"http:\/\/www.examiner.com\/article\/anonymous-launches-multiple-leak-platforms-under-operation-mayhem-tyler\">Examiner.com<\/a>, it may be hard to determine who is associated with the Anonymous group or any other &#8220;establishment&#8221;-related entities set up solely to gather information on participants and to entrap those who are actively leaking information. Leaked data were said to be available via TYLER, a Wikipedia style peer-to-peer network reachable after the installation of some dedicated software. Today, it is difficult to measure the significance of this platform.<\/p>\n<p>The lack of results is sometimes considered detrimental to the Anonymous reputation and its image. Many uncoordinated operations such as DDoS are launched for just one day but never succeed over the long term. (The targeted companies recover within a day.) Yet the other side will say these are uncoordinated efforts for certain ops but that doesn&#8217;t mean Anonymous is in decline.<\/p>\n<h2><span style=\"text-decoration: underline;\">Too many script kiddies and opportunists?<\/span><\/h2>\n<p>We also noted some thought-provoking arrests in 2012:<\/p>\n<ul>\n<li>Sabu (Q1), who cooperated with the police<\/li>\n<li>CabinCr3w members (Q2): This one was not very serious, using an <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/hacker-leaves-online-trail-loses-anonymity\">image of his girlfriend<\/a> for his claims<\/li>\n<li>TriCk (TeaMp0isoN leader), 17 years old (Q2): A curious choice as an \u201cAnonymous\u201d member who appears<a href=\"http:\/\/news.softpedia.com\/news\/TeaMp0isoN-Confirm-TriCk-s-Arrest-Operation-Retaliation-Starts-264663.shtml\"> more kid than terrorist<\/a><\/li>\n<\/ul>\n<p>Are these arrests a sign of immaturity or a sign of gradual decay? What are their real motivations?<br \/>\nSome will say the arrests lead only to script kiddies. Others will mention Barrett Brown and add that arrests have made Anonymous more cautious but certainly not silent.<\/p>\n<h2><span style=\"text-decoration: underline;\">The need of another name?<\/span><\/h2>\n<p>In some recent attacks, the claims were not made solely by Anonymous, but also by groups called Parastoo\u2014after breaking into the <a href=\"http:\/\/cryptome.org\/2012\/11\/parastoo-hacks-iaea.htm\">International Atomic Energy Agency server<\/a>\u2014or NullCrew\u2014which claimed responsibility for multiple computer attacks against corporations, educational institutions, and government agencies. Perhaps for these people, calling themselves Anonymous and nothing more may now be inadequate to meet their goals?\u00a0Here, like me, some researchers will explain that if we need to use your own pseudonym or a group name you cease to be a real Anonymous. Others will reply there has <strong>always<\/strong> been alignment between Anonymous and other groups.<\/p>\n<h2><span style=\"text-decoration: underline;\">Reinforcement of other actors<\/span><\/h2>\n<p>Anonymous is just one aspect of hacktivism. Without the Anonymous banner, people with strong political motivation, long-term dedication, or high-level hacking techniques will create significant actions in the future. Some will defend their ideas of freedom, like French hacktivists supporting people fighting against the new <a href=\"http:\/\/owni.fr\/2012\/11\/06\/nddl-telecomix-des-hackers-atterrissent-a-notre-dame-des-landes\/\">French Notre Dame des Landes airport<\/a>. Others (which we call cyberarmies) will convey extremist ideas from nondemocratic countries. For example, do not confuse Anonymous and The Izz ad-Din al Qassam Cyber Fighters group responsible for recent attack on banks in the United States (Operation Ababil).<\/p>\n<h2><span style=\"text-decoration: underline;\">Several successes in 2012<\/span><\/h2>\n<p>Despite many discontinued operations, Anonymous enjoyed condemning the Megaupload closure (OpMegaUpload in Q1), demonstrating in European streets and online against SOPA, PIPA, ACTA, etc. (Q1), or in <a href=\"http:\/\/news.softpedia.com\/news\/Anonymous-to-Initiate-Operation-Jubilee-on-November-5-2012-Video-286821.shtml\">London on November 5<\/a> attacking the Westboro Baptist Church group after the Connecticut massacre (Q4).<\/p>\n<h2><span style=\"text-decoration: underline;\">Decline or second era?<\/span><\/h2>\n<p>In my last whitepaper on hacktivism (page 31), I included a diagram explaining where hacktivism is headed:<\/p>\n<p style=\"text-align: left;\">It seems to me that Anonymous in its actual form (first era) will have difficulty surviving. Those in it \u201cfor the lulz\u201d are taking a step backward. For the present, this step may be the most significant movement in the group because the movements of \u201cReal political consciousness\u201d and \u201cCooperation\u201d are still in their early stages. Anonymous in its second era has not yet appeared. That is why we predicted a decline in 2013. By next year, we should know if the Anonymous (second era) has appeared or if the movement morphes into another hacktivist group such as \u201cCyberoccupiers.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814],"coauthors":[3973],"class_list":["post-21351","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Future of Hacktivism and Anonymous | McAfee Blog<\/title>\n<meta name=\"description\" content=\"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Future of Hacktivism and Anonymous | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-18T18:35:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:35:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/01\/Anon_03b-300x88.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Future of Hacktivism and Anonymous\",\"datePublished\":\"2013-01-18T18:35:21+00:00\",\"dateModified\":\"2025-06-06T08:35:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\"},\"wordCount\":979,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\",\"name\":\"The Future of Hacktivism and Anonymous | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2013-01-18T18:35:21+00:00\",\"dateModified\":\"2025-06-06T08:35:51+00:00\",\"description\":\"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"The Future of Hacktivism and Anonymous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Future of Hacktivism and Anonymous | McAfee Blog","description":"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Future of Hacktivism and Anonymous | McAfee Blog","og_description":"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-01-18T18:35:21+00:00","article_modified_time":"2025-06-06T08:35:51+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/01\/Anon_03b-300x88.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Future of Hacktivism and Anonymous","datePublished":"2013-01-18T18:35:21+00:00","dateModified":"2025-06-06T08:35:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/"},"wordCount":979,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/","name":"The Future of Hacktivism and Anonymous | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2013-01-18T18:35:21+00:00","dateModified":"2025-06-06T08:35:51+00:00","description":"After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of a possible slowdown in","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-future-of-hacktivism-and-anonymous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"The Future of Hacktivism and Anonymous"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/21351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=21351"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/21351\/revisions"}],"predecessor-version":[{"id":215174,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/21351\/revisions\/215174"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=21351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=21351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=21351"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=21351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}