{"id":24094,"date":"2024-10-16T06:00:24","date_gmt":"2024-10-16T13:00:24","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=24094"},"modified":"2024-10-16T10:25:35","modified_gmt":"2024-10-16T17:25:35","slug":"malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/","title":{"rendered":"What is Malware?"},"content":{"rendered":"<p>What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d<\/p>\n<p>In fact, \u201cmalware\u201d is a mash-up of \u201cmalicious software.\u201d It describes any type of software or code specifically designed to exploit a connected device or network without consent. And, unsurprisingly, hackers design most of it for financial gain.<\/p>\n<h2><strong>What kinds of malware are there?<\/strong><\/h2>\n<p>Think of malware as an umbrella term that covers an entire host of \u201cbad stuff,\u201d such as:<\/p>\n<p><strong>Spyware <\/strong>that tracks activity, like what you type and where you type it. (Think snooping on your bank account logins.<\/p>\n<p><strong>Ransomware<\/strong> that holds devices or the data on them hostage, that hackers only release for a price. (And even so, payment is no guarantee you\u2019ll get back your access.)<\/p>\n<p><strong>Adware<\/strong> that serves up spammy ads on your device. (The hacker gets paid for the number of \u201cimpressions\u201d the ads have. The more they show up on people\u2019s devices, the more they get paid.)<\/p>\n<p><strong>Botnet software<\/strong>, that hijacks a device into a remote-controlled network of other devices. (These networks are used to shut down websites or even shut down large portions of the internet, just to mention two of the things they can do.)<\/p>\n<p><strong>Rootkit<\/strong> that attacks that give hackers remote-control access to a device. (And with that control, they can wage all manner of attacks \u2014 on the device and on other devices too.)<\/p>\n<p><strong>Viruses<\/strong> that modify the way a device and its apps function. Also, they can effectively bring a device or network to a grinding halt. (Yes, viruses are a subset of malware. They can copy, delete, and steal data, among other things.)<\/p>\n<h2><strong>Viruses, the original malware<\/strong><\/h2>\n<p>You might know malware by its more commonly used name \u2014 viruses.<\/p>\n<p>There\u2019s a pretty good reason why people commonly refer to malware as a \u201cvirus.\u201d Viruses have been on our collective minds for some time.<\/p>\n<p>Viruses have a long history. You could call it \u201cthe original malware.\u201d And depending on how you define what a virus is, the first one took root in 1971 \u2014 more than 50 years ago. It was known as Creeper, and rather than being malicious in nature, the creator designed it to show how a self-replicating program could spot other devices on a network, transfer itself to them, and find yet more devices to repeat the process. Later, the same programmer who created a refined version of Creeper developed Reaper, a program that could remove the Creeper program. In a way, Reaper could be considered the first piece of antivirus software.<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a><\/p>\n<p>From there, it wasn\u2019t until the 1980s that malware started affecting the broader population, a time when computers became more commonplace in businesses and people\u2019s homes.<\/p>\n<p>At first, malware typically spread by infected floppy disks, much like the \u201cBrain\u201d virus in 1986. While recognized today as the first large-scale computer virus, its authors say they never intended it to work that way. Rather, they say they created Brain as an anti-piracy measure to protect their proprietary software from theft. However, Brain got loose. It went beyond their software and affected computers worldwide. Although not malicious or destructive in nature, Brain most certainly put the industry, businesses, and consumers on notice. Computer viruses were a thing.<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a><\/p>\n<p>Another piece of malware that got passed along via floppy disks was the \u201cPC Cyborg\u201d attack that targeted the medical research community in and around 1989. There, the malware would lie in wait until the user rebooted their computer for the 90<sup>th<\/sup> time and was presented with a digital ransom note.<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a><\/p>\n<p>An early example of ransomware &#8211; Source, Wikipedia<\/p>\n<p>Upon that 90<sup>th<\/sup> boot, PC Cyborg encrypted the computer\u2019s files, which would only get unencrypted if the victim paid a fee, making it the first documented form of ransomware.<\/p>\n<p>Shortly thereafter, the internet started connecting computers, which opened millions of doors for hackers as people went online. Among the most noteworthy was 1999\u2019s \u201cMelissa\u201d virus, which spread by way of infected email attachments and overloaded hundreds of corporate and governmental email servers worldwide.<\/p>\n<p>It was quickly followed in 2000 by what\u2019s considered among the most damaging malware to date \u2014 ILOVEYOU, which also spread by way of an attachment, this one posing as a love letter. Specifically, it was a self-replicating worm that installed itself on the victim\u2019s computer where it destroyed some info and stole other info, then spread to other computers. One estimate put the global cost of ILOVEYOU at $10 billion. It further speculated that it infected 10% of the world\u2019s internet-connected computers at the time.<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a><\/p>\n<h2><strong>Antivirus, your best defense against malware<\/strong><\/h2>\n<p>With that history, it\u2019s no surprise that anti-malware software is commonly called \u201cantivirus.\u201d<\/p>\n<p>Antivirus forms a major cornerstone of online protection software. It protects your devices against malware through a combination of prevention, detection, and removal. Our antivirus uses AI to detect the absolute latest threats \u2014 and has for several years now.<\/p>\n<p>Today, McAfee registers more than a million new malicious programs and potentially unwanted apps (PUA) each day, which contributes to the millions and millions already in existence. Now with the arrival of AI-powered coding tools, hackers can create new strains at rates unseen before.<\/p>\n<p>That\u2019s another reason why we use AI in our antivirus software. We use AI to protect against AI-created malware. It does so in three ways:<\/p>\n<ol>\n<li><strong>It<\/strong><strong> detects threats by referencing models of existing threats.<\/strong> This combats pre-existing threats and entirely new (zero-day) threats alike. AI can spot a variety of different threats by comparing them to features it\u2019s seen before. For example, it\u2019s like AI learning to identify different varieties of fruit. An apple is still an apple whether it\u2019s a Fuji or Granny Smith. In that way, a virus is still a virus if it\u2019s \u201cVirus A\u201d or the newly discovered \u201cVirus Z.\u201d<\/li>\n<li><strong>It further detects <\/strong><strong>unusual<\/strong><strong> events and behaviors.<\/strong> AI provides a particularly powerful tool against zero-day threats. It analyzes the activities of applications for patterns that are consistent with malicious behavior. With that, it can spot and prevent a previously unknown file or process from doing harm. In its way, AI says, \u201cI\u2019ve seen this sketchy behavior before. I\u2019m going to flag it.\u201d<\/li>\n<li><strong>It automatically classifies threats and adds them to its body of knowledge. <\/strong>AI-driven threat protection gets stronger over time. Because it learns. Something we call \u201cthreat intelligence.\u201d The more threats it encounters, the more rapidly and readily it can determine if files want to do you no good. The body of threat intelligence improves immensely as a result.<\/li>\n<\/ol>\n<p>Once again, it\u2019s important to remind ourselves that today\u2019s malware is created largely for profit. Hackers use it to gain personal and financial info, either for their own purposes or to sell it for profit. The files you have stored on your devices have a street value. That includes tax returns, financial docs, payment info, and so on. Moreover, when you consider all the important things you keep on your devices, like your photos and documents, those have value too. Should you get caught up in a ransomware attack, a hacker puts a price tag on them for their return.<\/p>\n<p>Needless to say, and you likely know this already, antivirus is essential for you and your devices.<\/p>\n<p>You\u2019ll find our AI-powered antivirus in all our <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee+ plans<\/a>. Better yet, our plans have dozens of protections that block the ways hackers distribute malware. To name just a few, our <a href=\"https:\/\/www.mcafee.com\/learn\/text-scam-detector?path=blogs\" target=\"_blank\" rel=\"noopener\">Text Scam Detector<\/a> blocks links to suspicious sites that host malware and other attacks \u2014 and our <a href=\"https:\/\/www.mcafee.com\/learn\/web-protection?path=blogs\" target=\"_blank\" rel=\"noopener\">Web Protection<\/a> does the same for your browser. It also includes our industry-first <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/protection-score.html?path=blogs\" target=\"_blank\" rel=\"noopener\">online protection score<\/a> that shows you just how safe you are, along with suggestions that can make you safer still. Together, our McAfee+ plans offer more than just antivirus. They protect your devices, your privacy, and your identity overall.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/www.historyofinformation.com\/detail.php?entryid=2860\" target=\"_blank\" rel=\"noopener\">https:\/\/www.historyofinformation.com\/detail.php?entryid=2860<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> <a href=\"https:\/\/www.historyofinformation.com\/detail.php?id=1676\" target=\"_blank\" rel=\"noopener\">https:\/\/www.historyofinformation.com\/detail.php?id=1676<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2016\/05\/the-computer-virus-that-haunted-early-aids-researchers\/481965\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.theatlantic.com\/technology\/archive\/2016\/05\/the-computer-virus-that-haunted-early-aids-researchers\/481965\/<\/a><\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a> <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/05\/04\/this-20-year-old-virus-infected-50-million-windows-computers-in-10-days-why-the-iloveyou-pandemic-matters-in-2020\" target=\"_blank\" rel=\"noopener\">https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/05\/04\/this-20-year-old-virus-infected-50-million-windows-computers-in-10-days-why-the-iloveyou-pandemic-matters-in-2020<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":202795,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,12],"tags":[180,214],"coauthors":[15735],"class_list":["post-24094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-family-safety","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Malware? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Malware? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-16T13:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-16T17:25:35+00:00\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"What is Malware?\",\"datePublished\":\"2024-10-16T13:00:24+00:00\",\"dateModified\":\"2024-10-16T17:25:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\"},\"wordCount\":1351,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png\",\"keywords\":[\"malware\",\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\",\"name\":\"What is Malware? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png\",\"datePublished\":\"2024-10-16T13:00:24+00:00\",\"dateModified\":\"2024-10-16T17:25:35+00:00\",\"description\":\"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is malware and why should I be concerned?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Malware? | McAfee Blog","description":"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What is Malware? | McAfee Blog","og_description":"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-10-16T13:00:24+00:00","article_modified_time":"2024-10-16T17:25:35+00:00","author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"What is Malware?","datePublished":"2024-10-16T13:00:24+00:00","dateModified":"2024-10-16T17:25:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/"},"wordCount":1351,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png","keywords":["malware","mobile security"],"articleSection":["Internet Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/","name":"What is Malware? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png","datePublished":"2024-10-16T13:00:24+00:00","dateModified":"2024-10-16T17:25:35+00:00","description":"What is malware? A dictionary-like definition is \u201cmalicious software that attacks computers, smartphones, and other connected devices.\u201d In fact, \u201cmalware\u201d","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/04\/300x200_Blog_101024.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"What is malware and why should I be concerned?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=24094"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24094\/revisions"}],"predecessor-version":[{"id":202832,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/24094\/revisions\/202832"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/202795"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=24094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=24094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=24094"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=24094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}