{"id":27223,"date":"2013-07-16T17:02:34","date_gmt":"2013-07-17T00:02:34","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=27223"},"modified":"2025-06-02T19:35:04","modified_gmt":"2025-06-03T02:35:04","slug":"malware-manipulates-procedure-prologue-and-epilogue-to-evade-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/","title":{"rendered":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security"},"content":{"rendered":"<p>Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and other methods were effective for various lengths of time. But eventually antimalware programs gained detection techniques to combat these steps.<\/p>\n<p>Malware authors next started frequently changing code and other data; now malware binaries are modified multiple times per day to evade detection. We have discussed some of the most common methods of modifications in previous blogs. Today we&#8217;ll talk about the opcode modification of procedure prologue and epilogue sequences. The modification is used by some fake-alert malware.<\/p>\n<h2><strong>Modifying Opcode <\/strong><\/h2>\n<p>The opcode modification technique replaces the standard opcodes generated by a compiler with different opcodes&#8211;and without changing the outcome of the code.<\/p>\n<h2><b>Prologue and Epilogue<\/b><\/h2>\n<p>The procedure prologue and epilogue are standard initialization sequences that compilers generate for almost all of their functions. The particulars of these sequences depend on the specific compiler used and on the calling conventions. Most functions start with a prologue that sets up a stack frame for the function and ends with an epilogue that clears the stack frame.<\/p>\n<p>Here&#8217;s a typical 32-bit McAfee architecture assembly-language function prologue:<\/p>\n<p style=\"padding-left: 30px;\">PUSH EBP\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u00a0 &#8212;&gt; Save Base Pointer<\/p>\n<p style=\"padding-left: 30px;\">MOV EBP,ESP\u00a0\u00a0\u00a0\u00a0 &#8212;&gt; EBP becomes the temporary stack pointer<\/p>\n<p>And here&#8217;s a typical epilogue:<\/p>\n<p style=\"padding-left: 30px;\">POP EBP\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&gt; Recover Base pointer<\/p>\n<p style=\"padding-left: 30px;\">RET\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 &#8212;&gt; Return from the function<\/p>\n<p>Next we see a typical and a modified prologue:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\"><img decoding=\"async\" class=\"size-medium wp-image-27226 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\" alt=\"Typical_Prologue\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><i>Figure 1.1: A typical procedure prologue.\u00a0 <\/i><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Prologue.bmp\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-27224\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Prologue.bmp\" alt=\"Modified_Prologue\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><i>Figure 1.2:<\/i> <em>A m<\/em><i>odified procedure prologue.<\/i><\/p>\n<p>Now let&#8217;s look at an example of a typical and a modified epilogue:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Epilogue.bmp\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-27225\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Epilogue.bmp\" alt=\"Typical_Epilogue\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><em>Figure 2.1: A typical procedure epilogue.<\/em><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Epilogue_1.bmp\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-27227\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Epilogue_1.bmp\" alt=\"Modified_Epilogue_1\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><i>Figure 2.2:<\/i> <i>A modified procedure epilogue.<\/i><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Epilogue_2.bmp\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-27228\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Modified_Epilogue_2.bmp\" alt=\"Modified_Epilogue_2\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><i>Figure 2.3:<\/i> <i>Another modified procedure epilogue.<\/i><\/p>\n<p>&nbsp;<\/p>\n<p>The preceding screenshots show standard opcodes generated by the compiler and the modified ones used by fake-alert malware to evade code-based detection. McAfee has complete coverage and detects all variants that use this technique.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[3923,180],"coauthors":[3973],"class_list":["post-27223","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-email-and-web-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-17T00:02:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T02:35:04+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Malware Manipulates Procedure Prologue and Epilogue to Evade Security\",\"datePublished\":\"2013-07-17T00:02:34+00:00\",\"dateModified\":\"2025-06-03T02:35:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\"},\"wordCount\":340,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\",\"keywords\":[\"email and web security\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\",\"name\":\"Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\",\"datePublished\":\"2013-07-17T00:02:34+00:00\",\"dateModified\":\"2025-06-03T02:35:04+00:00\",\"description\":\"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Malware Manipulates Procedure Prologue and Epilogue to Evade Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog","description":"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog","og_description":"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2013-07-17T00:02:34+00:00","article_modified_time":"2025-06-03T02:35:04+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security","datePublished":"2013-07-17T00:02:34+00:00","dateModified":"2025-06-03T02:35:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/"},"wordCount":340,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp","keywords":["email and web security","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/","name":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp","datePublished":"2013-07-17T00:02:34+00:00","dateModified":"2025-06-03T02:35:04+00:00","description":"Techniques used by malware developers to evade detection by security software have changed drastically in recent years. Encryption, packers, wrappers, and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2013\/07\/Typical_Prologue.bmp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/malware-manipulates-procedure-prologue-and-epilogue-to-evade-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Malware Manipulates Procedure Prologue and Epilogue to Evade Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=27223"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27223\/revisions"}],"predecessor-version":[{"id":214938,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/27223\/revisions\/214938"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=27223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=27223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=27223"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=27223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}