{"id":37551,"date":"2014-09-04T06:00:45","date_gmt":"2014-09-04T13:00:45","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=37551"},"modified":"2025-08-07T21:35:40","modified_gmt":"2025-08-08T04:35:40","slug":"quick-look-at-the-current-threat-landscape","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/","title":{"rendered":"Mobile Malware, Phishing and Ransomware \u2014 Oh My!"},"content":{"rendered":"<p>So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software that encrypts and locks data until the victim pays a ransom; we\u2019ve seen a steady increase in the number of phishing attacks\u2014targeted attacks aimed at tricking unwary victims into loading <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\">malware<\/a> onto their devices; and, as has been the trend for some time, we\u2019ve seen a steadily rising number of mobile malware variants out in the wild. And that\u2019s all without even mentioning the word \u201c<a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/heartbleed-phishing-scam\/\" target=\"_blank\" rel=\"noopener\">Heartbleed<\/a>.\u201d So what\u2019s changed over the past few months? Our team of security researchers at McAfee Labs\u2122 set out to find the answer to that question. What they found they put into their McAfee Labs Threats Report: August 2014.<\/p>\n<h2><strong>Mobile malware: A steady increase<\/strong><\/h2>\n<p>Perhaps the most disconcerting trend in cybersecurity is the steady growth of <a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/the-mobile-threats-you-cant-even-see\/\" target=\"_blank\" rel=\"noopener\">mobile malware<\/a>, which is spread through malicious or infected apps. The creation of new mobile malware has consistently remained at the same rate for the past few quarters. This latest quarter is no different, with 700,000 new samples found. That is a 17% growth of mobile malware in Q2. Mobile devices are more prevalent than ever, giving hackers plenty of opportunities to exploit vulnerabilities where they can find them. So what can be done?<\/p>\n<ul>\n<li><strong>Protect your mobile devices.<\/strong> For added protection on your mobile device, or for those who already have desktop protection software, McAfee\u00ae Mobile Security, free for\u00a0<a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141398\" target=\"_blank\" rel=\"noopener\">iOS<\/a>\u00a0and <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141397\" target=\"_blank\" rel=\"noopener\">Android<\/a>\u00a0users, will help protect your data with backup and recovery for contacts, photos and videos. It even includes a location tracker should your physical device get lost or stolen. The Android version also provides app protection, which reviews permissions of\u00a0downloaded\u00a0apps to see if they\u2019re requesting too much of your data. It also provides you with an app reputation report, based on a proprietary algorithm that takes into account the app category as well as the developer reputation.<\/li>\n<\/ul>\n<h2><strong>Ransomware: It\u2019s going down<\/strong><\/h2>\n<p>The creation of new ransomware dropped 63% this past quarter, but that doesn\u2019t mean new ransomware isn\u2019t being created. In fact, there\u2019ve been 63,857 new instances found in the past quarter. \u00a0Industry efforts to build awareness and protect against ransomware have made it more difficult for hackers to make money from this type of attack. And that\u2019s a good thing. Let\u2019s take a look at one ransomware variant by the name of <a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-zeus-cryptolocker\/\" target=\"_blank\" rel=\"noopener\">CryptoLocker<\/a>. CryptoLocker infects computers when a victim opens a malicious attachment sent via email. Once the computer is infected, the ransomware encrypts the victim\u2019s files and produces a popup demanding that the victim pay to recover the files. Typically, victims are given a set amount of time\u201472 hours\u2014to pay up. To protect yourself from ransomware, you can download McAfee LiveSafe\u2122\u00a0service, which will help lock down your computer and mobile device to keep hackers at bay. Oh, and while it\u2019s great to see ransomware drop on PCs, we have also seen ransomware show up on mobile devices so be careful when using your mobile devices to download apps, surf the web and open emails.<\/p>\n<h2><strong>Phishing attacks continue to hook victims<\/strong><\/h2>\n<p>A <a href=\"https:\/\/www.mcafee.com\/learn\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener\">phishing attack<\/a> is an attack designed to trick you into downloading a malicious file. The most popular method that hackers use to infect their victims is to send them an email that looks like it\u2019s from a popular web service or brand. Inside this email, there is often a link that sends you to a fake website loaded with malware. Unfortunately, phishing attacks are on the rise. McAfee Labs detected more than 250,000 new phishing URLs last quarter, bringing the total to almost one million new sites within the last 12 months. But it isn\u2019t just the number of malicious websites that are increasing, it\u2019s the sophistication of attacks as well. Thanks to the hyper-personal and hyper-sharing nature of social media, hackers now have the ability to thoroughly research their victims\u2019 habits and interests with little effort. This allows attackers to craft phishing messages that stand a better chance of being clicked on by a victim. Phishing messages are typically short in nature\u2014many attempt to look like order confirmations\u2014and are filled with graphics of the brand being abused. The sense of urgency, along with a convincingly stylized email, can lure in even the most cautious among us.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Jkt0zFbin90\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>To protect yourself, you can use\u00a0<a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=146614\" target=\"_blank\" rel=\"noopener\">McAfee\u00ae SiteAdvisor\u00ae,<\/a> which protects your devices from clicking to risky sites. This web protection is also available with our free Android mobile security product, <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=141397\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security.<\/a> If there\u2019s one thing we can take away from the August threats report, it\u2019s that hackers are as active as ever. Whether they\u2019re using mobile malware, ransomware, or phishing attacks to try to extract your personal information\u2014it\u2019s important to never let your guard down when browsing the Web. To stay on top of the latest consumer and mobile security threats, follow <a href=\"https:\/\/twitter.com\/mcafeeconsumer\" target=\"_blank\" rel=\"noopener\">@McAfeeConsumer<\/a> on Twitter and Like us on <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through&#8230;<\/p>\n","protected":false},"author":674,"featured_media":172066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,1838,8050],"tags":[4140],"coauthors":[3973],"class_list":["post-37551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-mobile-security","category-mcafee-news","tag-quarterly-threats-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog<\/title>\n<meta name=\"description\" content=\"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-04T13:00:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-08T04:35:40+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Mobile Malware, Phishing and Ransomware \u2014 Oh My!\",\"datePublished\":\"2014-09-04T13:00:45+00:00\",\"dateModified\":\"2025-08-08T04:35:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png\",\"keywords\":[\"Quarterly Threats Report\"],\"articleSection\":[\"Security News\",\"Mobile Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\",\"name\":\"Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png\",\"datePublished\":\"2014-09-04T13:00:45+00:00\",\"dateModified\":\"2025-08-08T04:35:40+00:00\",\"description\":\"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png\",\"width\":614,\"height\":300,\"caption\":\"mobile spyware affecting battery\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"McAfee News\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mcafee-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile Malware, Phishing and Ransomware \u2014 Oh My! A Quick Look at the Current Threat Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog","description":"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog","og_description":"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-09-04T13:00:45+00:00","article_modified_time":"2025-08-08T04:35:40+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Mobile Malware, Phishing and Ransomware \u2014 Oh My!","datePublished":"2014-09-04T13:00:45+00:00","dateModified":"2025-08-08T04:35:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png","keywords":["Quarterly Threats Report"],"articleSection":["Security News","Mobile Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/","name":"Mobile Malware, Phishing and Ransomware \u2014 Oh My! | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png","datePublished":"2014-09-04T13:00:45+00:00","dateModified":"2025-08-08T04:35:40+00:00","description":"So far, 2014 has been a tumultuous year for the security industry. We\u2019ve seen thousands of computers taken hostage through ransomware\u2014malicious software","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/07\/614x300_Blog_Mobile-Spyware.png","width":614,"height":300,"caption":"mobile spyware affecting battery"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/quick-look-at-the-current-threat-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"McAfee News","item":"https:\/\/www.mcafee.com\/blogs\/mcafee-news\/"},{"@type":"ListItem","position":3,"name":"Mobile Malware, Phishing and Ransomware \u2014 Oh My! A Quick Look at the Current Threat Landscape"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=37551"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37551\/revisions"}],"predecessor-version":[{"id":214322,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37551\/revisions\/214322"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/172066"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=37551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=37551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=37551"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=37551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}