{"id":36610,"date":"2014-07-14T10:25:08","date_gmt":"2014-07-14T17:25:08","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=36610"},"modified":"2025-08-19T10:41:34","modified_gmt":"2025-08-19T17:41:34","slug":"google-maps-attack-shuts-down-business","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/","title":{"rendered":"The Surprisingly Simple Google Maps Attack That Shut Down a Business"},"content":{"rendered":"<p style=\"text-align: left;\" align=\"center\">Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital map.<\/p>\n<p><i><a href=\"https:\/\/www.wired.com\/2014\/07\/hacking-google-maps\/?mbid=social_fb\" target=\"_blank\" rel=\"noopener noreferrer\">WIRED has<\/a><\/i> an excellent profile on a type of cyber attack that takes advantage of a service\u2019s social aspects in an effort to divert, damage or destroy another business. These attacks can come in the form of a proper hack, where coding or a certain level of skill is needed, or a hijack, where an attacker poses as its victim on an online repository like Facebook or Google Places. Regardless, by playing on people\u2019s expectations, hackers can achieve their desired effect.<\/p>\n<p>This type of attack can also be considered, under certain circumstances, to be a <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering attack<\/a>. Typically, social engineering attacks use personal information that can be found online to play on your emotions to get you give away sensitive information like bank accounts or passwords. But they can also, much like a real-life <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/denial-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">Denial-of-Service Attack (DoS)<\/a>, be used to deprive a service or person\u2019s resources.<\/p>\n<p>The attack in question centers on an exotic meat restaurant called Serbian Crown in Great Falls, Virginia. The restaurant, in operation for 40 years, according to the article, was a popular spot. But in early 2012, the exotic meat emporium had a precipitous drop in customers\u2014up to 75% on the weekend, its most frequented days. The manager of the restaurant, Rene Bertagna, was puzzled.<\/p>\n<p>Bertagna didn\u2019t know something sinister was happening until a regular patron called asking why the restaurant was closed on the weekends. That sinister activity: a community edit to his restaurant\u2019s business hours on Google Places. Instead of reading as \u201copen\u201d during its busiest hours, the online profile read \u201cclosed.\u201d Unfortunately, Bertagna\u2019s epiphany came too late to save the restaurant.<\/p>\n<p>This type of attack, unfortunately, is more common than one would like to think. Local rivalries, malicious political activists and cutthroat deception often drive information wars on sites like Google Places and Yelp where anyone in the community can make edits or comments. These wars often result in damaged reputations and lost business from illegitimate comments, hijackings and misleading claims.<\/p>\n<p>It\u2019s a problem that likely won\u2019t go away soon thanks to the need for crowdsourced information. Google, Yelp and others, as technologically savvy as they are, cannot differentiate between legitimate contributions to the accuracy of their services and malicious ones.<\/p>\n<h2>Steps to Fight Back<\/h2>\n<p>So how can you defend yourself from social attacks of this nature? Sadly, there isn\u2019t much. These attacks are hard to detect\u2014and <a href=\"https:\/\/searchengineland.com\/thousands-of-hotels-listings-were-hijacked-in-google-local-181670\" target=\"_blank\" rel=\"noopener noreferrer\">hard to fix<\/a>\u2014especially when parsing legitimate complaints against malicious ones. But there are steps you can take to save your skin from callous online comments.<\/p>\n<ul>\n<li><strong>Be conscious of social media. <\/strong>Social media is a great way to communicate with a large amount of people instantaneously, but it can also provide a massive headache. Consciously monitoring most\u2014if not all\u2014social networks is a great way to protect both your reputation, and your business\u2019 reputation.<\/li>\n<\/ul>\n<ul>\n<li><strong>Protect your identity online.<\/strong> Protecting your identity online isn\u2019t as easy as it sounds. Monitoring for malicious websites that steal your information and for malcontents trying to give you a bad name is an impossible task. Make that task possible with <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service, which protects your identity from risky applications and malicious websites.<\/li>\n<li><strong>Know the signs of an attack.<\/strong> Some social attacks are difficult to detect. Others, not so much. The more sinister and widespread social attacks usually try to divert victims to malicious <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">websites or applications<\/a>. If you see a suspicious website trying to pass itself off as a legitimate brand, then run away! You can also use <a href=\"https:\/\/www.siteadvisor.com\/howitworks\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee SiteAdvisor<\/a>\u2122 to protect your devices from known phishing sites.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to&#8230;<\/p>\n","protected":false},"author":674,"featured_media":135964,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661],"tags":[142,4287],"coauthors":[3973],"class_list":["post-36610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","tag-tag-identity-theft","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-14T17:25:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T17:41:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Surprisingly Simple Google Maps Attack That Shut Down a Business\",\"datePublished\":\"2014-07-14T17:25:08+00:00\",\"dateModified\":\"2025-08-19T17:41:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\"},\"wordCount\":640,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg\",\"keywords\":[\"identity theft\",\"social engineering\"],\"articleSection\":[\"Security News\",\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\",\"name\":\"The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg\",\"datePublished\":\"2014-07-14T17:25:08+00:00\",\"dateModified\":\"2025-08-19T17:41:34+00:00\",\"description\":\"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg\",\"width\":614,\"height\":300,\"caption\":\"woman's phone with location tracking apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Surprisingly Simple Google Maps Attack That Shut Down a Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog","description":"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog","og_description":"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-07-14T17:25:08+00:00","article_modified_time":"2025-08-19T17:41:34+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Surprisingly Simple Google Maps Attack That Shut Down a Business","datePublished":"2014-07-14T17:25:08+00:00","dateModified":"2025-08-19T17:41:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/"},"wordCount":640,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg","keywords":["identity theft","social engineering"],"articleSection":["Security News","Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/","name":"The Surprisingly Simple Google Maps Attack That Shut Down a Business | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg","datePublished":"2014-07-14T17:25:08+00:00","dateModified":"2025-08-19T17:41:34+00:00","description":"Not all hacking requires code-cracking programmers who can slip through complex algorithms. No, sometimes all you need to do to pull out a map\u2014a digital","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/07\/614x300_TrackingApps.jpg","width":614,"height":300,"caption":"woman's phone with location tracking apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/google-maps-attack-shuts-down-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The Surprisingly Simple Google Maps Attack That Shut Down a Business"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=36610"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36610\/revisions"}],"predecessor-version":[{"id":220728,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36610\/revisions\/220728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/135964"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=36610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=36610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=36610"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=36610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}