{"id":35646,"date":"2014-05-27T06:00:35","date_gmt":"2014-05-27T13:00:35","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=35646"},"modified":"2025-08-07T22:38:51","modified_gmt":"2025-08-08T05:38:51","slug":"ransomware-goes-mobile","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/","title":{"rendered":"Ransomware Goes Mobile"},"content":{"rendered":"<p>The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal computers\u2014<a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/no-surprise-ransomware-on-the-rise\" target=\"_blank\" rel=\"noopener noreferrer\">tools like ransomware.<\/a><\/p>\n<p>Ransomware is a type of malicious software that either locks you out of your device, and\/or holds your data hostage, until you pay a ransom fee. There are a few variations of ransomware\u2014from popup messages in your browser that take control of your screen to programs that encrypt your data and hold the key to decrypting it hostage\u2014but it has largely been confined to personal computers until now.<\/p>\n<p>A new type of mobile ransomware, named Android.Trojan.Koler.A (Koler for short), is making an unwelcomed appearance and targeting Android users. Believed to be the work of the gang responsible for the <a href=\"https:\/\/www.theguardian.com\/technology\/2014\/may\/08\/android-porn-koler-a-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">Revetol \/ Icepol Trojan<\/a>, Koler goes after mobile users viewing pornography on their Android devices. It tries to scare its victims into paying the $300 ransom by claiming the victim has viewed \u201cillegal pornography\u201d and posts a warning message from a bogus law enforcement agency (the agency in question changes depending on which country you\u2019re in).<\/p>\n<p>While this type of ransomware sounds scary and can certainly spread beyond its targeted demographic, there are a few things going against Koler. For one, Koler can\u2019t be found and unwittingly downloaded from an app store (and hopefully never will be), which cuts the risk factor of infection down significantly. The malicious software, or <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware,<\/a> also needs to be purposefully installed by the user. That means that it has to trick a user into downloading the malware onto their device, usually done by prompting them to download a \u201cpremium video player\u201d or other extra feature. Additionally, Koler can actually be <a href=\"https:\/\/www.theguardian.com\/technology\/2014\/may\/08\/android-porn-koler-a-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">easily removed<\/a>\u2014the key is to remain calm and not fall for the ploy.<\/p>\n<p>Most likely, Koler in its current form probably won\u2019t be responsible for locking you out of your mobile devices. However, it will most likely serve as a prototype for more advanced mobile ransomware variations in the future. As more people come to depend on their mobile devices, more hackers will be attracted to exploit other people\u2019s property.<\/p>\n<h2>Good Security Practices<\/h2>\n<p>With these risks in mind, it\u2019s important to practice good security on all of your devices\u2014no matter what sites you look at.<\/p>\n<ul>\n<li><strong>Be careful where you browse. <\/strong>There is a lot of nastiness on the Internet, so knowing what sites put you most at risk is crucial to staying safe. As I\u2019ve mentioned <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/flappy-bird-app-shutdown\" target=\"_blank\" rel=\"noopener noreferrer\">before<\/a>, it isn\u2019t just pornographic sites (or nasty apps) you have to worry about, as dangerous content, more often than not, masquerades as something far more innocuous.<\/li>\n<\/ul>\n<ul>\n<li><strong>Don\u2019t download apps from third parties. <\/strong>Downloading unapproved apps on your mobile device will always be risky business. Third-party apps aren\u2019t in major app stores for a reason\u2014most likely because they\u2019re either unsecure or malicious. If you absolutely have to download from a third-party, make sure to do some research on the app in question beforehand.<\/li>\n<\/ul>\n<ul>\n<li><strong>Install security software on all mobile devices. <\/strong>Malicious websites and apps are not going away. So, today, security that helps protect your privacy and identity is a must. That means installing security software on all of your devices. Some software, like McAfee\u00ae Mobile Security, is free for both <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141397\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> and <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141398\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.wsandroid.suite&amp;cid=141397\" target=\"_blank\" rel=\"noopener noreferrer\">The Android version<\/a> of McAfee Mobile Security provides a comprehensive safeguard against dangerous apps before they can harm your device or personal data. It includes McAfee\u00ae SiteAdvisor\u00ae, which shows a warning message if you navigate to a potentially dangerous website, or click on a malicious link in a text, email, QR code or social networking post.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,4200,180,4238,4132,214,4067],"coauthors":[3973],"class_list":["post-35646","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-ios","tag-malware","tag-mcafee-mobile-security","tag-mobile-app","tag-mobile-security1","tag-mobile-threat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Goes Mobile | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Goes Mobile | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-27T13:00:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T05:38:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/lianne-caetano.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Ransomware Goes Mobile\",\"datePublished\":\"2014-05-27T13:00:35+00:00\",\"dateModified\":\"2025-08-08T05:38:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"keywords\":[\"android\",\"iOS\",\"malware\",\"McAfee Mobile Security\",\"mobile app\",\"mobile security\",\"mobile threat\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\",\"name\":\"Ransomware Goes Mobile | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"datePublished\":\"2014-05-27T13:00:35+00:00\",\"dateModified\":\"2025-08-08T05:38:51+00:00\",\"description\":\"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"width\":300,\"height\":200,\"caption\":\"laptop with a ransomware threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Goes Mobile\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Goes Mobile | McAfee Blog","description":"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware Goes Mobile | McAfee Blog","og_description":"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-05-27T13:00:35+00:00","article_modified_time":"2025-08-08T05:38:51+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/lianne-caetano.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Ransomware Goes Mobile","datePublished":"2014-05-27T13:00:35+00:00","dateModified":"2025-08-08T05:38:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/"},"wordCount":622,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","keywords":["android","iOS","malware","McAfee Mobile Security","mobile app","mobile security","mobile threat"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/","name":"Ransomware Goes Mobile | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","datePublished":"2014-05-27T13:00:35+00:00","dateModified":"2025-08-08T05:38:51+00:00","description":"The dominance of mobile devices has given hackers a growing market to chase after, with many of the same tools they\u2019ve previously used to target personal","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","width":300,"height":200,"caption":"laptop with a ransomware threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ransomware-goes-mobile\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Ransomware Goes Mobile"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35646","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=35646"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35646\/revisions"}],"predecessor-version":[{"id":217963,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35646\/revisions\/217963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125966"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=35646"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=35646"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=35646"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=35646"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}