{"id":26825,"date":"2013-07-23T08:00:22","date_gmt":"2013-07-23T15:00:22","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=26825"},"modified":"2025-08-08T04:55:16","modified_gmt":"2025-08-08T11:55:16","slug":"is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/","title":{"rendered":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors"},"content":{"rendered":"<p>Nothing in life is free, and that&#8217;s especially true when it comes to mobile apps.<\/p>\n<p>Thousands of free apps are flooding the marketplace\u2014most are legitimate and available at no initial cost. But they often come at the price of offering up data from your smartphone or tablet that you might not be aware of or comfortable with sharing. It can be unsettling to know that for use of a free app, you could be exchanging potentially sensitive information through location tracking, targeted advertisements and other privacy invasions. And it\u2019s not just the innocuous apps that are swiping your data, a heap of malware-laden apps are also flooding the marketplace looking for your vital information.<\/p>\n<p>Even more disturbing, for Android users specifically, these apps are devised to both use and abuse your device for illicit financial gain. These apps act less as genuine services and more as vehicles for malware\u2014programs that will steal and transmit sensitive data (spyware), or turn your device into a collection of Internet-connected programs communicating with other programs in order to perform malicious tasks (<a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-a-botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>). Some skim your address book and send messages pretending to be you (<a href=\"https:\/\/home.mcafee.com\/advicecenter\/?id=rs_na_su12article4&amp;culture=en-us&amp;affid=0\" target=\"_blank\" rel=\"noopener noreferrer\">worm<\/a>), while others sneak into your system, pretending to be harmless while performing a number of unpleasant actions in the background (<a href=\"https:\/\/home.mcafee.com\/AdviceCenter\/Default.aspx?id=rs_na_su10article3&amp;culture=EN-US&amp;affid=0\" target=\"_blank\" rel=\"noopener noreferrer\">trojan<\/a>).<\/p>\n<p>Many of these malware-laden apps contain several of the above snares and will eventually enslave your device in a network that only powers more malware and data theft.<\/p>\n<p>It&#8217;s a security situation worth being concerned over. In our recent report, \u201c<a href=\"https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-mobile-security-consumer-trends.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Security: McAfee Consumer Trends Report \u2013 June 2013<\/a>,&#8221; one in six downloaded applications on Android contain suspicious URLs and malware. Many of these exploits operate by &#8220;rooting&#8221; your Android device (or jailbreaking if you&#8217;re on an iPhone running iOS). Rooting allows users to hack their mobile device, be it a tablet or smartphone, and gain \u201cprivileged\u201d access to the Android operating system in order to alter or replace a number of settings, system apps, admin permissions and more. However, those permissions are there for a reason: to protect consumers from risky applications.<\/p>\n<p>These hacked apps and suspicious programs are most prevalent in third-party app stores, often mixed in with legitimate apps. And they\u2019re difficult to spot, unless you really know what to be on the lookout for. More often than not, try to stay clear of using third-party stores that may put your information at risk and stick to primary channels.<\/p>\n<p>But should you venture into the lesser-known sites and stores for your apps, there are steps you can take to protect yourself from suspect apps and potential malware.<\/p>\n<p>A few signs you can use to detect malware:<\/p>\n<ul>\n<li><strong>Watch for System Updates from Suspect Sources:<\/strong> One of the more troubling trends in malware has been malicious apps posing as legitimate security updates. One type of malware, called NotCompatible, poses as a system update for Android, ironically enough to protect users from malware. It doesn&#8217;t. Instead, the malware will install a botnet program, which will later take commands from the hacker and take over your phone and seemingly secure data.<\/li>\n<li><strong>Double Check App Permissions:<\/strong> There&#8217;s always detail in the permissions. Always check the app&#8217;s permissions before downloading a new app. One of the more telling signs of a malware-infected app is if it asks for near complete access to the data on your device. Be on the safe side and avoid apps that ask for such sweeping privileges. A game app most likely does not require your location information.<\/li>\n<li><strong>Check Your Text Messages (and Your Phone Bill):<\/strong> One popular form of malware scams users not by stealing their banking info, but by sending premium-rate text messages thereby increasing your mobile phone bill. This can happen in a variety of manners, ranging from silently sending the messages to getting a user to unknowingly send a message, leading to oftentimes astronomically high phone bills.<\/li>\n<li><strong>Think Twice Before You Opt Out:<\/strong> Free apps often are loaded with software promoting various mobile ads. The ads alone aren\u2019t the problem\u2014developers need to make money and what better way than by selling ads? But the worrisome part comes when an app asks a user to do something seemingly benign in order to remove ads.\n<ul style=\"padding-left: 25px; margin-bottom: 0px!Important;\">\n<li style=\"font-size: 11px; list-style: square!Important;\">For instance: FakeRun will ask users to press a button in order to remove ads, a seemingly innocent request. However, the button doesn&#8217;t actually remove the ads, but instead gives the app a five-star rating on the Google Play Store. That five-star rating makes the suspect developer appear more trusted in the eyes of the Google apps store, giving the hacker increased credibility and the opportunity to publish more malware-laden apps.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>It&#8217;s a frighteningly skilled form of a social engineering attack\u2014one where the attacker emulates something familiar to exploit users\u2014but this kind of attack can be avoided. Users should only download system updates from trusted sites like the Google Play Store. While not every third-party site is out to attack you, avoiding them is the only guarantee that what you&#8217;re downloading is genuine.<\/p>\n<p>As <a href=\"https:\/\/mcafee.com\/blogs\/others\/mobile\/download-with-caution-mcafee-identifies-risky-mobile-app-sources\" target=\"_blank\" rel=\"noopener noreferrer\">we&#8217;ve previously noted<\/a>, there are many risks associated with malicious mobile apps, both to you and other mobile device users that can be infected through a malicious download on your own phone. To help you stay protected from malicious apps, use comprehensive mobile security, like <a href=\"https:\/\/home.mcafee.com\/store\/mobile-security\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u00ae Mobile Security<\/a>, that will not only scan your device for viruses and threat, but also help you identify apps that are accessing too much of your valuable personal information. To protect all the devices, you own, use <a href=\"https:\/\/home.mcafee.com\/store\/mcafee-livesafe\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service, which not only protects your mobile devices, but all your PCs and Macs as well.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nothing in life is free, and that&#8217;s especially true when it comes to mobile apps. Thousands of free apps are&#8230;<\/p>\n","protected":false},"author":674,"featured_media":154456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,49,1298,338,180,214],"coauthors":[3973],"class_list":["post-26825","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-botnet","tag-cloud-security","tag-endpoint-protection","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Nothing in life is free, and that&#039;s especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Nothing in life is free, and that&#039;s especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-23T15:00:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T11:55:16+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors\",\"datePublished\":\"2013-07-23T15:00:22+00:00\",\"dateModified\":\"2025-08-08T11:55:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\"},\"wordCount\":963,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"keywords\":[\"android\",\"botnet\",\"cloud security\",\"endpoint protection\",\"malware\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\",\"name\":\"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"datePublished\":\"2013-07-23T15:00:22+00:00\",\"dateModified\":\"2025-08-08T11:55:16+00:00\",\"description\":\"Nothing in life is free, and that's especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"width\":1250,\"height\":675,\"caption\":\"mobile finance apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog","description":"Nothing in life is free, and that's especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog","og_description":"Nothing in life is free, and that's especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-07-23T15:00:22+00:00","article_modified_time":"2025-08-08T11:55:16+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors","datePublished":"2013-07-23T15:00:22+00:00","dateModified":"2025-08-08T11:55:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/"},"wordCount":963,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","keywords":["android","botnet","cloud security","endpoint protection","malware","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/","name":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","datePublished":"2013-07-23T15:00:22+00:00","dateModified":"2025-08-08T11:55:16+00:00","description":"Nothing in life is free, and that's especially true when it comes to mobile apps. Thousands of free apps are flooding the marketplace\u2014most are legitimate","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","width":1250,"height":675,"caption":"mobile finance apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/is-your-mobile-device-misbehaving-how-to-catch-common-malware-misbehaviors\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Is Your Mobile Device Misbehaving? How to Catch Common Malware Misbehaviors"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/26825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=26825"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/26825\/revisions"}],"predecessor-version":[{"id":218166,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/26825\/revisions\/218166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154456"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=26825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=26825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=26825"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=26825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}