{"id":33152,"date":"2014-02-07T15:14:19","date_gmt":"2014-02-07T23:14:19","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=33152"},"modified":"2025-06-02T01:36:28","modified_gmt":"2025-06-02T08:36:28","slug":"january-2014-secchat-wrap-threat-predictions","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/","title":{"rendered":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions"},"content":{"rendered":"<p>Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the financial data and identity of millions. And things don\u2019t show signs of slowing down. Each year, security threats become more sophisticated and difficult to identify, with 2014 expected to be the same. Cybercriminals are constantly looking for new avenues of penetration into enterprise systems and consumer data, while security professionals across the board are wondering where the next attack will come from and how they\u2019ll combat the growing variety of potential breaches aimed at their network and endpoint defenses.<\/p>\n<p>With this in mind, McAfee Labs researchers recently released the McAfee Labs 2014 Threats Predictions report, detailing what we see as the biggest security concerns for the next 12 months.<\/p>\n<p>Mobile malware, ransomware, social attacks, and big data topped our list. However, while compiling the report, we decided that we probably weren\u2019t the only security professionals with predictions. So on January 30, we hosted a Twitter chat with Adam Wosotowsky, McAfee Labs Anti-Spam Operations Technology Principal, and Ryan Sherstobitoff, McAfee Labs Threat Researcher, to spark conversation around the topic.<\/p>\n<p>For about an hour, security professionals and other interested individuals gathered on Twitter to talk shop around a variety of security issues\u2014from big data to high-profile breaches. Below are some highlights from the chat.<\/p>\n<h2><strong>What are your security predictions?<\/strong><\/h2>\n<p>We started off by opening the floor to anyone who wanted to share their own ideas on 2014 threats. We saw two common threads emerge. First, a number of security professionals cited specific types of attacks they predicted to be on the rise in 2014.<span style=\"line-height: 1.5em;\">\u00a0<\/span><\/p>\n<p>Meanwhile, another conversation was arising around \u201cpsychological threats.\u201d The topic that got the most attention was <a href=\"https:\/\/twitter.com\/securelexicon\" target=\"_blank\" rel=\"noopener noreferrer\">@securelexicon<\/a>\u2019s thoughts on what he referred to as apathy.<\/p>\n<p>Next, the group delved into specific types of attacks mentioned by participants and in the report.<\/p>\n<h2><strong>Target, Neiman Marcus: What\u2019s next?<\/strong><\/h2>\n<p>2014 started off with a bang for the information security community, with the high-profile breaches of Target, Neiman Marcus, and Michaels Stores. We asked our participants if this was a sign of bigger attacks to come.<\/p>\n<p>Most participants saw the number of high-profile breaches as an indicator that companies weren\u2019t doing enough to maximize their customers\u2019 security. <a href=\"https:\/\/twitter.com\/VirtualTal\" target=\"_blank\" rel=\"noopener noreferrer\">@VirtualTal<\/a> said that companies were simply concerned with compliance, and not actually securing their data. <a href=\"https:\/\/twitter.com\/aamirlakhani\" target=\"_blank\" rel=\"noopener noreferrer\">@aamirlakhani<\/a> and <a href=\"https:\/\/twitter.com\/SCADAhacker\" target=\"_blank\" rel=\"noopener noreferrer\">@SCADAhacker<\/a> agreed that companies should invest in \u201cdetection and response and not just prevention.\u201d<\/p>\n<p>It wasn\u2019t all negative however, as @RickChrisos was quick to suggest that perhaps these headline-grabbing breaches will open the eyes of big organizations, resulting in increased security for the future.<\/p>\n<h2><strong>Advanced Malware, Big Data, and IoT<\/strong><\/h2>\n<p>Three of the biggest trends discussed during our #SecChat related to emerging technologies, and how the security industry will have to respond to these developments.<\/p>\n<p style=\"text-align: left;\">First, we asked the group about their biggest challenge regarding advanced malware. Many participants, such as <a href=\"https:\/\/twitter.com\/Wh1t3Rabbit\" target=\"_blank\" rel=\"noopener noreferrer\">@Wh1t3Rabbit<\/a> and <a href=\"https:\/\/twitter.com\/jtyrus\" target=\"_blank\" rel=\"noopener noreferrer\">@jtyrus<\/a>, thought the biggest issue is that it continues to be difficult to detect. The consensus was that the security community will need to go further in looking for vulnerabilities and providing penetration tests. @GetZeroFOX had a theory on why we continue to see the amount of advanced malware grow.<\/p>\n<p>The conversation on advanced malware transitioned to a discussion on big data. Some participants, such as <a href=\"https:\/\/twitter.com\/tomgarcia_IS\" target=\"_blank\" rel=\"noopener noreferrer\">@TomGarcia_IS,<\/a> saw big data and cloud applications as overall threats to company security. Others, such as <a href=\"https:\/\/twitter.com\/aamirlakhani\" target=\"_blank\" rel=\"noopener noreferrer\">@aamirlakhani,<\/a> see big data as an opportunity.<\/p>\n<p>Finally, we discussed one of 2014\u2019s hottest topics to date \u2013 \u201cthe Internet of Things.\u201d While IoT can be an exciting trend for consumers, most security professionals view it as a concern, as there are still more than a few security vulnerabilities present in new \u201csmart\u201d devices.<\/p>\n<p><span style=\"line-height: 1.5em;\">Overall, last week\u2019s #SecChat was quite the interesting snapshot of where threats are expected to be headed in 2014. To stay up-to-date on the latest in security news and issues, be sure to follow #SecChat host <\/span><a style=\"line-height: 1.5em;\" href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee<\/a><span style=\"line-height: 1.5em;\">on Twitter.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4139,4141,4064],"coauthors":[4136],"class_list":["post-33152","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-annual-threats-predictions","tag-mcafee-labs-report","tag-secchat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-07T23:14:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:36:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Screen-Shot-2014-02-07-at-2.20.32-PM.png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"January 2014 #SecChat Wrap-up \u2014 Threat Predictions\",\"datePublished\":\"2014-02-07T23:14:19+00:00\",\"dateModified\":\"2025-06-02T08:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\"},\"wordCount\":673,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"Annual Threats Predictions\",\"McAfee Labs Report\",\"SecChat\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\",\"name\":\"January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2014-02-07T23:14:19+00:00\",\"dateModified\":\"2025-06-02T08:36:28+00:00\",\"description\":\"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"January 2014 #SecChat Wrap-up \u2014 Threat Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog","description":"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog","og_description":"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-02-07T23:14:19+00:00","article_modified_time":"2025-06-02T08:36:28+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Screen-Shot-2014-02-07-at-2.20.32-PM.png","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions","datePublished":"2014-02-07T23:14:19+00:00","dateModified":"2025-06-02T08:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/"},"wordCount":673,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["Annual Threats Predictions","McAfee Labs Report","SecChat"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/","name":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2014-02-07T23:14:19+00:00","dateModified":"2025-06-02T08:36:28+00:00","description":"Threats seem to be top of mind for the masses of late\u2014with three large-scale attacks on major brands already this year, potentially compromising the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/january-2014-secchat-wrap-threat-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"January 2014 #SecChat Wrap-up \u2014 Threat Predictions"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/33152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=33152"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/33152\/revisions"}],"predecessor-version":[{"id":214829,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/33152\/revisions\/214829"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=33152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=33152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=33152"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=33152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}