{"id":37355,"date":"2014-08-18T08:00:52","date_gmt":"2014-08-18T15:00:52","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=37355"},"modified":"2025-08-07T21:40:38","modified_gmt":"2025-08-08T04:40:38","slug":"iphone-connection-vulnerability","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/","title":{"rendered":"The iPhone\u2019s Biggest Weakness May Be Your Computer"},"content":{"rendered":"<p>Mobile <a href=\"https:\/\/www.mcafee.com\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating system has seen the brunt of attacks due to its immense popularity and accessibility around the globe. Apple\u2019s iOS ecosystem, while also widely popular, has maintained a mostly malware free presence. Even law enforcement agencies have a <a href=\"https:\/\/www.cnet.com\/news\/ios-scores-as-most-secure-mobile-os-in-new-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">hard time cracking iOS<\/a>\u2019 security shell.<\/p>\n<p>But that shell may have a weak spot, and that is your phone\u2019s connection to your computer. That\u2019s the conclusion a team of researchers from the Georgia Institute of Technology came to after rigorously testing Apple\u2019s ecosystem and finding that while the system itself is secure, the weakness lies in the other systems the smartphone connects to in sync operations. The team, according to <em>IDG News Service<\/em>, is set to present its findings at the Usenix Security Symposium.<\/p>\n<p>Until recently, iOS devices synced with computers through what\u2019s known as a Universal Serial Bus (USB) cable. This white cable would carry all of your phone\u2019s data over to your computer. Your computer, in return, would update your phone with new applications you may have purchased or new songs, and sync other data such as contacts and settings to your smartphone.<\/p>\n<p>But Apple has since introduced a feature that allows you to sync over Wi-Fi, which lets you do the same tasks, but without the need to connect your USB cable to your computer to do so. And therein lies the danger: data, whether over cable or Wi-Fi, leaves the safety of your mobile device and travels across an unsecured space, providing hackers with an in to your \u201ciDevice.\u201d<\/p>\n<p>When your device transfers data to and from a computer, it does so trustingly. However, it cannot tell if your computer is infected with malicious software, or \u201cmalware,\u201d which gives hackers their in. If a computer is infected with a piece of malware designed to work in a <a href=\"https:\/\/www.mcafee.com\/learn\/what-is-botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>\u2014or a network of computers working together over the Internet to achieve a desired goal\u2014a hacker has the chance to trick your iDevice into downloading a malicious app without your knowledge.<\/p>\n<p>It does so in two ways: first, it uses an Apple ID belonging to you or someone else; second, it manipulates a developer certificate\u2014used to show that an app is legitimate\u2014to trick the iDevice into thinking it\u2019s downloading a safe app. When in fact, it isn\u2019t.<\/p>\n<p>Thankfully, though, this attack has\u2014to our knowledge\u2014only been exploited by security research professionals.<\/p>\n<h2>Tips to Protect Yourself from Malware<\/h2>\n<p>So what can you do to lessen the likelihood of downloading malware onto your mobile device? Well, thankfully, there are a few things you can do:<\/p>\n<ul>\n<li><strong>Don\u2019t connect your iDevice to untrusted computers.<\/strong> The key vulnerability in this hack is the computer. So, it stands to reason, that if you don\u2019t want to find malware on your phone, don\u2019t connect it to a computer you are unfamiliar with, such as a public or shared computer. Yes, that may be easier said than done, but if you feel that there is a chance the computer could have been compromised by malware, don\u2019t put your phone at risk as well.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security.<\/strong> This hack uses computer-based malware to infect your iPhone. But you can defend yourself from this type of attack by taking up a multi-faceted approach to security. With <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service you can lock down your computer and mobile device to keep hackers at bay. And for added protection on your mobile device, or for those who already have desktop protection software, McAfee\u00ae Mobile Security, free for <a href=\"https:\/\/itunes.apple.com\/us\/app\/mcafee-security\/id724596345?mt=8&amp;cid=141398\">iOS<\/a> users, will help protect your data with backup and recovery for contacts, photo and video. It even includes a location tracker should your physical device get lost or stolen.<\/li>\n<\/ul>\n<ul>\n<li><strong>Don\u2019t jailbreak your iPhone.<\/strong> I\u2019ve discussed the dangers of jailbreaking at length before, but it bears repeating: the only guaranteed way a hacker can infect your iDevice with malware (besides the above vulnerability) is through a device that has been jailbroken. If you don\u2019t want to run the risk of getting malware on your iPhone, then don\u2019t jailbreak.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":120106,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[4060,4238,4295,4279,214,4067],"coauthors":[3973],"class_list":["post-37355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-consumer-threat-notice","tag-mcafee-mobile-security","tag-mobile","tag-mobile-devices","tag-mobile-security1","tag-mobile-threat"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-18T15:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T04:40:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The iPhone\u2019s Biggest Weakness May Be Your Computer\",\"datePublished\":\"2014-08-18T15:00:52+00:00\",\"dateModified\":\"2025-08-08T04:40:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\"},\"wordCount\":715,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png\",\"keywords\":[\"Consumer Threat Notice\",\"McAfee Mobile Security\",\"mobile\",\"mobile devices\",\"mobile security\",\"mobile threat\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\",\"name\":\"The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png\",\"datePublished\":\"2014-08-18T15:00:52+00:00\",\"dateModified\":\"2025-08-08T04:40:38+00:00\",\"description\":\"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png\",\"width\":614,\"height\":300,\"caption\":\"man on laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The iPhone\u2019s Biggest Weakness May Be Your Computer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog","description":"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog","og_description":"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-08-18T15:00:52+00:00","article_modified_time":"2025-08-08T04:40:38+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/Gary_Davis_1_Waist-Up_72dpi-copy1-200x3001.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The iPhone\u2019s Biggest Weakness May Be Your Computer","datePublished":"2014-08-18T15:00:52+00:00","dateModified":"2025-08-08T04:40:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/"},"wordCount":715,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png","keywords":["Consumer Threat Notice","McAfee Mobile Security","mobile","mobile devices","mobile security","mobile threat"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/","name":"The iPhone\u2019s Biggest Weakness May Be Your Computer | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png","datePublished":"2014-08-18T15:00:52+00:00","dateModified":"2025-08-08T04:40:38+00:00","description":"Mobile malware is the fastest growing security threat we face today. But that threat has long been lopsided, and unfortunately, Android mobile operating","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/614X300.png","width":614,"height":300,"caption":"man on laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-connection-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"The iPhone\u2019s Biggest Weakness May Be Your Computer"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=37355"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37355\/revisions"}],"predecessor-version":[{"id":217955,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37355\/revisions\/217955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/120106"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=37355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=37355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=37355"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=37355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}