{"id":36148,"date":"2014-06-24T14:34:50","date_gmt":"2014-06-24T21:34:50","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=36148"},"modified":"2025-08-17T22:46:38","modified_gmt":"2025-08-18T05:46:38","slug":"facebook-trojan-bitcoin-mining","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/","title":{"rendered":"Trojan Turns Computers Into Bitcoin Mining Machines"},"content":{"rendered":"<p>It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/online-casinos-help-hackers-keep-illegal-loot\" target=\"_blank\" rel=\"noopener noreferrer\">favored currency<\/a> for the underworld. It is so popular, in fact, that hackers are going out of their way to turn mundane objects connected to the Internet\u2014objects like thermostats, scales and refrigerators\u2014into Bitcoin mining machines in an effort to create more of this precious virtual currency.<\/p>\n<p>Though they exist entirely in the ether, bitcoins don\u2019t appear out of thin air. Rather, they are created through a process called \u201cmining,\u201d requiring a user to purchase special hardware and dedicate a part, or all, of their computer to solving complex mathematical problems in order to \u201cmint\u201d a bitcoin. These problems get more complicated as more bitcoins are created, making it harder to mine the currency. Hackers, however, have found a solution: distribute the mining of bitcoins to multiple machines by hijacking computers into a network working towards a single goal\u2014creating bitcoins.<\/p>\n<p>To some, it may seem like a harmless exploit to create a currency that may or <a href=\"https:\/\/freedom-to-tinker.com\/blog\/felten\/bitcoin-mining-now-dominated-by-one-pool\/\" target=\"_blank\" rel=\"noopener noreferrer\">may not survive the year<\/a>. But to others, namely those who create malicious software, a widespread Bitcoin mining <a href=\"https:\/\/home.mcafee.com\/AdviceCenter\/Default.aspx?id=rs_na_su10article3&amp;culture=EN-US&amp;affid=0\" target=\"_blank\" rel=\"noopener noreferrer\">Trojan<\/a>\u2014a malicious program that disguises itself as something else\u2014could be a means to a different end.<\/p>\n<p>For example, consider the latest Bitcoin miner Trojan to hit the Internet. Spread through Facebook, this Trojan compromises victims through a little tactic we in the security world refer to as <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">\u201csocial engineering.\u201d<\/a><\/p>\n<p>Social engineering is the basic principal behind all hacking. It exploits relationships to compromise accounts, computers and networks. The social aspect of the compromise can manifest in a few ways: through the collection of publicly available information available both online and off; through deceit, by impersonating a trusted friend online; by posing as a vendor or support agent; or by simply leaving a USB stick behind in the hopes that people\u2019s nosy nature will lead them to inserting it into their own computer.<\/p>\n<p>This particular Trojan tricks victims into thinking their friends are sharing a photo with them via a private chat in Facebook. In truth, the file contains a disguised program built to hijack a small part of your computer for Bitcoin mining. After it installs itself, the Trojan sends data back to the main server.<\/p>\n<p>Mining, it appears, is this program\u2019s purpose. But the infection also happens to install a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/backdoor-threat\" target=\"_blank\" rel=\"noopener noreferrer\">backdoor<\/a>\u2014one which allows the hackers in control of the Trojan to install additional <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> on your computer.<\/p>\n<p>That\u2019s worrisome.<\/p>\n<h2>Protect Your Devices from Being Hijacked<\/h2>\n<p>So how can you protect your devices from being hijacked for nefarious purposes? Well, there are a few things you can do:<\/p>\n<ul>\n<li><strong>Don\u2019t download suspicious files.<\/strong> The Internet is a useful tool to send and receive messages that improve our daily lives. But unsolicited programs, third party apps and data files that arrive as attachments or links should raise your suspicion, as clicking and downloading them could unintentionally compromise your devices.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be wary of unsolicited messages.<\/strong> Social engineering attacks can be hard to avoid because they prey on the nature of trusting relationships. But crude attempts can be detected. For example, the nameless Trojan mentioned in this post spread by sending messages saying \u201chahaha\u201d with a file attached. You can avoid being compromised by simply ignoring the message or by asking if the sender meant to relay a message with an attachment.<\/li>\n<li><strong>Install comprehensive security.<\/strong> A comprehensive security suite can protect you from malicious links, websites and other nefarious tactics hackers use to compromise your security. Covering your online identity and protecting your mobile devices and computers is simple and with <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125960,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[],"coauthors":[3973],"class_list":["post-36148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog<\/title>\n<meta name=\"description\" content=\"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-06-24T21:34:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T05:46:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Trojan Turns Computers Into Bitcoin Mining Machines\",\"datePublished\":\"2014-06-24T21:34:50+00:00\",\"dateModified\":\"2025-08-18T05:46:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\",\"name\":\"Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"datePublished\":\"2014-06-24T21:34:50+00:00\",\"dateModified\":\"2025-08-18T05:46:38+00:00\",\"description\":\"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"width\":300,\"height\":200,\"caption\":\"Bitcoin transaction on mobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trojan Turns Computers Into Bitcoin Mining Machines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog","description":"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog","og_description":"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-06-24T21:34:50+00:00","article_modified_time":"2025-08-18T05:46:38+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Trojan Turns Computers Into Bitcoin Mining Machines","datePublished":"2014-06-24T21:34:50+00:00","dateModified":"2025-08-18T05:46:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/","name":"Trojan Turns Computers Into Bitcoin Mining Machines | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","datePublished":"2014-06-24T21:34:50+00:00","dateModified":"2025-08-18T05:46:38+00:00","description":"It has long been known that Bitcoin\u2014the crypto-currency offering users almost completely anonymous transactions online\u2014is the favored currency for the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","width":300,"height":200,"caption":"Bitcoin transaction on mobile"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/facebook-trojan-bitcoin-mining\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Trojan Turns Computers Into Bitcoin Mining Machines"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=36148"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36148\/revisions"}],"predecessor-version":[{"id":220055,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36148\/revisions\/220055"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125960"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=36148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=36148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=36148"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=36148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}