{"id":35782,"date":"2014-06-02T14:40:09","date_gmt":"2014-06-02T21:40:09","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=35782"},"modified":"2025-08-17T22:51:00","modified_gmt":"2025-08-18T05:51:00","slug":"heartbleed-phishing-scam","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/","title":{"rendered":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-heartbleed\" target=\"_blank\" rel=\"noopener noreferrer\">It was big<\/a>. It still is big. Heartbleed affects nearly every person using the Internet (especially if you haven\u2019t changed your passwords since the bug was discovered) because the vulnerability deals with how servers interpret information, such as usernames and passwords, that is sent online. That means users cannot protect themselves from the vulnerability until the bug is fixed on the server\u2019s side\u2014meaning a company\u2019s IT administrator has to fix it.<\/p>\n<p>But it appears some hackers are trying to convince potential victims that Heartbleed can be \u201cuninstalled\u201d from their computers. They\u2019re doing this by sending out emails loaded with a \u201cHeartbleed remover\u201d tool attachment, which is really just a cleverly disguised package of <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malicious software<\/a>. This form of attack\u2014where a hacker or a group of hackers try to trick victims into compromising their devices\u2014is called a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">phishing attack<\/a>. And phishing attacks, even this one, usually have a few telltale signs.<\/p>\n<h2><strong>1. A link or attachment.<\/strong><\/h2>\n<p>This phishing attack is as dangerous as it is clever. It tries to trick you into downloading a \u201ccleaner\u201d for the Heartbleed bug, as if it was something that could be fixed on the user-side (once again, it\u2019s not). In reality, what you are downloading is a keylogger. Keyloggers are programs that record your keystrokes and send them back to the controlling hacker. With information from the keylogger, the hacker in question can login to your accounts and get access to your personal and financial information.<\/p>\n<p>A strong rule of thumb to live by online is to never open an attachment or click on a link that you weren\u2019t expecting, or one that comes from an unknown source.<\/p>\n<h2><strong>2. A sense of urgency.<\/strong><\/h2>\n<p>In this case, the phishing email contained a subject line pertaining to investments in Syria. The body of the phishing attack, however, was a warning telling the victim that they needed to run a program to make sure the Heartbleed \u201cvirus\u201d was removed from their computer. The email contained a plausible threat to those who aren\u2019t informed about Heartbleed, as well as a strong sense of urgency.<\/p>\n<h2><strong>3. Signs of mischief.<\/strong><\/h2>\n<p>But a closer look at the email gives us the evidence we need to dismiss it as a phishing attack. Take the subject line \u201cLooking for Investment Opportunities from Syria\u201d for example. The subject line had nothing to do with the body of the email. So there are two indicators right off of the bat: a peculiar subject line (sometimes referred to as the \u201cNigerian Prince\u201d subject line\u2014a reference to another phishing attack which promises the victim riches for a small fee) and an email body unrelated to the subject line. Other signs of mischief can include typos, English syntax errors, and the sender\u2019s email addresses containing odd characters.<\/p>\n<h2><strong>4. Dead giveaways.<\/strong><\/h2>\n<p>There\u2019s a line in the email that ought to give the scam away to anybody: \u201cIf you get a warning from windows or your Anti-Virus that this file might harm your computer, please ignore this warning \u2026 as it will be an attempt by the virus program to stop you from running the tool.\u201d It\u2019s a sentence explicitly telling you to ignore your own security programs. It\u2019s a subtle order, but it\u2019s one that\u2019s necessary for the attack to work. The same goes for other phishing attacks: a line telling you to click on this link; a single sentence saying you need to reset your password even though you never requested to reset your password; an invitation for you to donate money to a foreign beneficiary.<\/p>\n<p>All of these attacks follow similar patterns, but those patterns are getting harder to detect as hacking tools become both more common and more complex. So what can you do to defend yourself from such an attack? There\u2019re a few options available:<\/p>\n<ul>\n<li><strong>Read carefully. <\/strong>If you suspect you just opened a malicious email, don\u2019t fret. Read the email carefully and look for signs of mischief. Bad grammar is one sign\u2014a conflicting or mismatched subject line relative to the body of an email is another. If something looks wrong, delete the email.<\/li>\n<\/ul>\n<ul>\n<li><strong>Ignore attachments.<\/strong> If an unsolicited email contains an unsolicited attachment, then it is, in all likelihood, a phishing attack trying to trick you. Don\u2019t let your curiosity get the better of you. Just delete the email and the attachment along with it.<\/li>\n<li><strong>Always use comprehensive security (and never disable it).<\/strong> Whenever an email says you need to disable your anti-virus program in order to work, don\u2019t do it. Disabling your security solution is a guaranteed way of compromising not only your computer, but also anything remotely linked to it\u2014like your bank account, for example. Using a comprehensive security solution, like <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service can help protect your computer from malicious attachments and dangerous websites. Don\u2019t surf the Internet without a security solution in place.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It&#8230;<\/p>\n","protected":false},"author":674,"featured_media":124261,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4197],"coauthors":[3973],"class_list":["post-35782","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-heartbleed"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-02T21:40:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T05:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary-Davis1.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer\",\"datePublished\":\"2014-06-02T21:40:09+00:00\",\"dateModified\":\"2025-08-18T05:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\"},\"wordCount\":848,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"keywords\":[\"Heartbleed\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\",\"name\":\"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"datePublished\":\"2014-06-02T21:40:09+00:00\",\"dateModified\":\"2025-08-18T05:51:00+00:00\",\"description\":\"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg\",\"width\":247,\"height\":237,\"caption\":\"hacker attack, cyber crime concept, cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog","description":"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog","og_description":"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-06-02T21:40:09+00:00","article_modified_time":"2025-08-18T05:51:00+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary-Davis1.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer","datePublished":"2014-06-02T21:40:09+00:00","dateModified":"2025-08-18T05:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/"},"wordCount":848,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","keywords":["Heartbleed"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/","name":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","datePublished":"2014-06-02T21:40:09+00:00","dateModified":"2025-08-18T05:51:00+00:00","description":"Heartbleed, a vulnerability affecting nearly 70% of websites on the Internet, was discovered two months ago. It was big. It still is big. Heartbleed","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/Lock-copy-1-e1625073720182.jpeg","width":247,"height":237,"caption":"hacker attack, cyber crime concept, cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How Hackers are Using Heartbleed to Trick You into Infecting Your Computer"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=35782"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35782\/revisions"}],"predecessor-version":[{"id":220072,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/35782\/revisions\/220072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/124261"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=35782"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=35782"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=35782"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=35782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}