{"id":36927,"date":"2014-07-25T12:01:23","date_gmt":"2014-07-25T19:01:23","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=36927"},"modified":"2025-08-07T22:23:01","modified_gmt":"2025-08-08T05:23:01","slug":"ios-jailbreaking-source-hacked","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/","title":{"rendered":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked"},"content":{"rendered":"<p>In the world of mobile security there are two types of smartphone users: <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/how-does-jailbreaking-or-rooting-affect-my-mobile-device-security\" target=\"_blank\" rel=\"noopener noreferrer\">jailbreakers<\/a>, and everyone else. Everyone else is fairly harmless. They enjoy their smartphones as they are, and, for the most part, lead fairly secure mobile lives. The same, however, cannot be said for jailbreakers\u2014especially after one of the largest jailbreaking repositories for the iOS ecosystem was hacked.<\/p>\n<p>(And, yes, the <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/mobile-myths-can-my-apple-devices-get-hacked\" target=\"_blank\" rel=\"noopener noreferrer\">iOS ecosystem is hackable<\/a>.)<\/p>\n<p>Jailbreakers, for the uninitiated, are those who use special software to remove limitations imposed by Apple on devices running the iOS operating system. This allows them to gain root access to the operating system to be able to install apps obtained through means other than the official App Store. It can also allow them to use their mobile device on an alternate carrier\u2019s network than the one on which the phone was initially issued.<\/p>\n<p>There are, however, drawbacks to jailbreaking an iPhone. For one, your iPhone\u2019s warranty is typically voided as soon as it\u2019s jailbroken; for another, your iPhone\u2019s software can become buggy and unreliable; finally, the chance of downloading <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a>\u2014malicious programs hackers use to compromise devices\u2014jumps precipitously after jailbreaking a phone.<\/p>\n<p>That last point brings us back to the<a href=\"https:\/\/www.ibtimes.co.uk\/bigboss-repository-cydia-hacked-ripbigboss-contains-all-free-paid-packages-1457357\" target=\"_blank\" rel=\"noopener noreferrer\"> incident<\/a> at hand: one of the jailbreaking community\u2019s biggest third-party app repositories, BigBoss, has been hacked. All of the software in the repository\u2014some of which requires payment through services like PayPal\u2014is being given away for free on a hacker-created server.<\/p>\n<p>But free may carry an asterisk with it. The hackers responsible for the breach may have \u201cupdated\u201d their stolen goods with malware. Worse still is the possibility that the apps hosted on the original BigBoss repository could have been updated with malware as well. That should put many <a href=\"https:\/\/thehackernews.com\/2014\/07\/cydia-repository-by-bigboss-hacked-all.html\" target=\"_blank\" rel=\"noopener noreferrer\">jailbreakers on edge<\/a>.<\/p>\n<p>But that\u2019s the risk jailbreakers run when modifying their iPhones for capabilities beyond what Apple intentionally sold.<\/p>\n<h2>What to Do and Not to Do<\/h2>\n<p>So what\u2019s a casual jailbreaker to do in this case? Well, there are a few options:<\/p>\n<ul>\n<li><strong>Don\u2019t jailbreak your phone. I<\/strong>f you don\u2019t want to run the risk of downloading malware, then don\u2019t jailbreak your phone. It\u2019s that simple.<\/li>\n<\/ul>\n<ul>\n<li><strong>Don\u2019t download anything from the BigBoss repository. <\/strong>Another simple step, though a bit more hands-on, is to not download anything currently hosted by the BigBoss repository. Before you download any app, tap on the name of the app and scroll down to the bottom of its information page. Once there, look for the name of the repository in the bottom left corner, and if it reads BigBoss\u2014don\u2019t update it.<\/li>\n<li><strong>Protect your device with comprehensive security software.<\/strong> Even if you don\u2019t participate in the jailbreaking community, your iPhone can still be at risk. Fight back by protecting your iOS devices with our <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141398\" target=\"_blank\" rel=\"noopener noreferrer\">free McAfee Mobile Security<\/a>. Additionally, <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service can also be used to protect your mobile devices, tablets, PCs and Macs from malware and other viruses.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is&#8230;<\/p>\n","protected":false},"author":674,"featured_media":130414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[76,4200,4132,214],"coauthors":[3973],"class_list":["post-36927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-cybercrime","tag-ios","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-25T19:01:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T05:23:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked\",\"datePublished\":\"2014-07-25T19:01:23+00:00\",\"dateModified\":\"2025-08-08T05:23:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\"},\"wordCount\":509,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"keywords\":[\"cybercrime\",\"iOS\",\"mobile app\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\",\"name\":\"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"datePublished\":\"2014-07-25T19:01:23+00:00\",\"dateModified\":\"2025-08-08T05:23:01+00:00\",\"description\":\"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"width\":614,\"height\":300,\"caption\":\"everyday connected devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog","description":"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog","og_description":"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-07-25T19:01:23+00:00","article_modified_time":"2025-08-08T05:23:01+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked","datePublished":"2014-07-25T19:01:23+00:00","dateModified":"2025-08-08T05:23:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/"},"wordCount":509,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","keywords":["cybercrime","iOS","mobile app","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/","name":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","datePublished":"2014-07-25T19:01:23+00:00","dateModified":"2025-08-08T05:23:01+00:00","description":"In the world of mobile security there are two types of smartphone users: jailbreakers, and everyone else. Everyone else is fairly harmless. They enjoy","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","width":614,"height":300,"caption":"everyday connected devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ios-jailbreaking-source-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"More Reasons to Not Jailbreak Your Phone: App Repositories Get Hacked"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=36927"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36927\/revisions"}],"predecessor-version":[{"id":217959,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/36927\/revisions\/217959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/130414"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=36927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=36927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=36927"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=36927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}