{"id":37986,"date":"2014-09-16T10:55:10","date_gmt":"2014-09-16T17:55:10","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=37986"},"modified":"2025-06-06T02:05:26","modified_gmt":"2025-06-06T09:05:26","slug":"top-3-phishing-attacks-show-similar-behavior","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/","title":{"rendered":"Top 3 Phishing Attacks Use Similar Tricks"},"content":{"rendered":"<p>Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal your web mail credentials.<\/p>\n<h2><strong>Web Mail Scam<\/strong><\/h2>\n<p>This scam starts with an email that appears to come from Administrator or Helpdesk and requests that you validate or update your account. Clicking on the link in this message will take you to a fake Outlook Web Access Login page. This page is generally hosted on sites that are created by using free services. Attackers also use vulnerable servers (running CMS) to upload these fake pages, which allow scammers to collect your username and password for their own malicious use.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-37989 size-large\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png\" alt=\"WebMail Phish E-Mail Example\" width=\"1024\" height=\"498\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/webmailscamex20140915-1024x498.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/webmailscamex20140915-300x146.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/webmailscamex20140915.png 1055w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2><strong>iTunes Scam<\/strong><\/h2>\n<p>This attempt starts with an email purporting to be from the Apple Store. The email informs users that their accounts may have been hijacked. Users are asked to click a link and supply information to restore the account.<\/p>\n<p>Those panicked into clicking the link will be taken to a bogus website that looks like a genuine Apple login page. Attackers often use an &#8220;apple.com&#8221; string in the link to make the link appear legitimate, for example: hxxp:\/\/itunes.id.apple.com.example.com\/.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/applscamexpng20140915.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-37987 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/applscamexpng20140915.png\" alt=\"iTunes Phish E-mail\" width=\"801\" height=\"638\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/applscamexpng20140915.png 801w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/applscamexpng20140915-300x238.png 300w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/a><\/p>\n<h2><strong>Gmail Scam<\/strong><\/h2>\n<p>This Gmail scam is by far the most sophisticated phishing attack. It also starts with an email that urges readers to view an important document on Google Docs. Clicking the link will take them to a fake Google Docs login page.<\/p>\n<p>Recently, attackers used a Google Drive public folder to upload a fake Google Docs login page and then used Google Drive&#8217;s preview feature to get a publicly accessible URL to include in their messages. Because the page is hosted on Google&#8217;s server and is served over SSL, the page appears more convincing. After discovering the attack, Google has successfully removed the phishing pages, but the attackers are still using other vulnerable servers to upload the fake login page.<\/p>\n<p>It&#8217;s quite common to be prompted with a login page when accessing a Google Docs link, and many people may enter their credentials.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gmailphishex20140915.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-37988 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gmailphishex20140915.png\" alt=\"Gmail Phish\" width=\"715\" height=\"341\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gmailphishex20140915.png 715w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gmailphishex20140915-300x143.png 300w\" sizes=\"auto, (max-width: 715px) 100vw, 715px\" \/><\/a><\/p>\n<p>An ounce of prevention is worth a pound of cure in dealing with phishing. We advise you to watch for such scams and their modus operandi. You can avoid phishing attacks by following these simple steps:<\/p>\n<ul>\n<li>Don&#8217;t click on links sent via email messages by someone you don&#8217;t know<\/li>\n<li>Before entering credentials, always check the URL in the browser&#8217;s address bar for authenticity<\/li>\n<li>Be careful while sharing sensitive personal information over social networking sites<\/li>\n<li>Regularly change your account passwords<\/li>\n<li>Never share your account credentials over email or text<\/li>\n<\/ul>\n<p>McAfee customers are protected against these attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,3949,3923,142],"coauthors":[3973],"class_list":["post-37986","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-cybersafety","tag-email-and-web-security","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-16T17:55:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T09:05:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/webmailscamex20140915.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1055\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Top 3 Phishing Attacks Use Similar Tricks\",\"datePublished\":\"2014-09-16T17:55:10+00:00\",\"dateModified\":\"2025-06-06T09:05:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\"},\"wordCount\":451,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"cybersafety\",\"email and web security\",\"identity theft\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\",\"name\":\"Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png\",\"datePublished\":\"2014-09-16T17:55:10+00:00\",\"dateModified\":\"2025-06-06T09:05:26+00:00\",\"description\":\"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Top 3 Phishing Attacks Use Similar Tricks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog","description":"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog","og_description":"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-09-16T17:55:10+00:00","article_modified_time":"2025-06-06T09:05:26+00:00","og_image":[{"width":1055,"height":514,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/webmailscamex20140915.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Top 3 Phishing Attacks Use Similar Tricks","datePublished":"2014-09-16T17:55:10+00:00","dateModified":"2025-06-06T09:05:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/"},"wordCount":451,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png","keywords":["computer security","cybercrime","cybersafety","email and web security","identity theft"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/","name":"Top 3 Phishing Attacks Use Similar Tricks | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png","datePublished":"2014-09-16T17:55:10+00:00","dateModified":"2025-06-06T09:05:26+00:00","description":"Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing scams that attempt to steal","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/webmailscamex20140915-1024x498.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/top-3-phishing-attacks-show-similar-behavior\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Top 3 Phishing Attacks Use Similar Tricks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=37986"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37986\/revisions"}],"predecessor-version":[{"id":215192,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/37986\/revisions\/215192"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=37986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=37986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=37986"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=37986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}