{"id":40454,"date":"2014-12-29T15:38:26","date_gmt":"2014-12-29T23:38:26","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=40454"},"modified":"2025-08-19T10:37:47","modified_gmt":"2025-08-19T17:37:47","slug":"2014-security-year-review","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/","title":{"rendered":"2014: Security Year in Review"},"content":{"rendered":"<p>From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the security sphere. I\u2019ve <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/2015-security-predictions\" target=\"_blank\" rel=\"noopener noreferrer\">already discussed my predictions for 2015<\/a>, and now I\u2019d like to reflect on some of the most important security events of 2014 and what we\u2019ve learned along the way.<\/p>\n<h2><strong>First things first: Heartbleed<\/strong><\/h2>\n<p>It seems like a lifetime ago that we <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/what-is-heartbleed\" target=\"_blank\" rel=\"noopener noreferrer\">first heard the term \u2018Heartbleed\u2019<\/a> and realized what an impact it could (and would) have to personal data security on the Web. In fact, it was just eight months ago, though much has happened since.<\/p>\n<p>The discovery of Heartbleed prompted Internet users around the globe to update their passwords, for fear of leaked information, while developers scrambled to update their OpenSSL as quickly as possible. Referred to as the most widespread and perhaps debilitating vulnerability discovered to date, Heartbleed set the stage for a crippling year of cyber security threats. Unfortunately, many sites remain vulnerable.<\/p>\n<h2><strong>Point-of-sale breaches: en vogue<\/strong><\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/target-announces-70-million-more-victims\" target=\"_blank\" rel=\"noopener noreferrer\">Target<\/a>, <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/goodwill-potential-card-breach\" target=\"_blank\" rel=\"noopener noreferrer\">Goodwill<\/a>, <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/albertsons-supervalu-hacked\">Albertsons<\/a>, and <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/pf-changs-data-breach\" target=\"_blank\" rel=\"noopener noreferrer\">P.F. Chang\u2019s<\/a>. These are just a handful of the companies that suffered large-scale data breaches at their point-of-sale systems in 2014. As cybercriminals continue to evolve their methods, and companies weather their attacks in the public eye, the need for strong security is more apparent than ever. From a consumer standpoint, the need to keep transactions isolated to a single (or one-time-use) credit card is also more apparent than ever. As these companies work to secure their systems and data , we too can shrink our attack surface and lessen any potential damage that may be felt from a breach by being smart about how and where we spend.<\/p>\n<p>In addition to using a one-time-use credit card, you should check your financial statements on a weekly basis (at least). If you notice any suspicious activity, notify your bank at once.<\/p>\n<h2><strong>Shellshock makes waves<\/strong><\/h2>\n<p>As if one Internet-wide threat wasn\u2019t enough for the year, <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/shellshock-could-be-worse-than-heartbleed\" target=\"_blank\" rel=\"noopener noreferrer\">Shellshock emerged in September<\/a> just as many companies were picking up the pieces from Heartbleed. Shellshock is a vulnerability found in Bash (software used by millions of computers) that enables hackers to directly attack servers, routers and computers that are storing your personal information.\u00a0Though it was discovered this year, our team at McAfee Labs\u2122 anticipates that its effects will be felt for years to come.<\/p>\n<p>Because it\u2019s a software vulnerability, there is unfortunately not much you can do to protect yourself from Shellshock. Rather, device manufacturers bear the burden of updating their products so that they\u2019re no long vulnerable. What you <em>can<\/em> do to help protect your data is update your devices as soon as software updates are made available. This will help ensure that you have the latest patches for bugs\u2014as soon as they\u2019re discovered and remediated.<\/p>\n<h2><strong>Mobile threats: all shapes and sizes<\/strong><\/h2>\n<p>Attacks on mobile devices came in all shapes and sizes this year, and they\u2019re only expected to increase in 2015. From the <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/celebrity-photo-dump\" target=\"_blank\" rel=\"noopener noreferrer\">\u201ccelebgate\u201d attack<\/a> that leaked the nude photos of many popular celebrities, to <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/mobile-spyware\" target=\"_blank\" rel=\"noopener noreferrer\">mobile spyware<\/a> and <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/internet-of-things-cyberattack\" target=\"_blank\" rel=\"noopener noreferrer\">attacks on Internet of Things devices<\/a>, it has become apparent that hackers have found their new target(s) of choice. To protect your mobile devices from threats to come, I encourage you all to install our free mobile product, McAfee Mobile Security, on your <a href=\"https:\/\/app.appsflyer.com\/com.wsandroid.suite?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a> or <a href=\"https:\/\/app.appsflyer.com\/id724596345?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a> device. It will help protect against known threats, and ensure that your personal life remains personal.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting&#8230;<\/p>\n","protected":false},"author":674,"featured_media":163143,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,8050],"tags":[1814,142],"coauthors":[3973],"class_list":["post-40454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-mcafee-news","tag-computer-security","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The biggest cyber security threats of 2014<\/title>\n<meta name=\"description\" content=\"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The biggest cyber security threats of 2014\" \/>\n<meta property=\"og:description\" content=\"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-29T23:38:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T17:37:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"2014: Security Year in Review\",\"datePublished\":\"2014-12-29T23:38:26+00:00\",\"dateModified\":\"2025-08-19T17:37:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\"},\"wordCount\":579,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png\",\"keywords\":[\"computer security\",\"identity theft\"],\"articleSection\":[\"Security News\",\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\",\"name\":\"The biggest cyber security threats of 2014\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png\",\"datePublished\":\"2014-12-29T23:38:26+00:00\",\"dateModified\":\"2025-08-19T17:37:47+00:00\",\"description\":\"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png\",\"width\":614,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"2014: Security Year in Review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The biggest cyber security threats of 2014","description":"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The biggest cyber security threats of 2014","og_description":"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2014-12-29T23:38:26+00:00","article_modified_time":"2025-08-19T17:37:47+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"2014: Security Year in Review","datePublished":"2014-12-29T23:38:26+00:00","dateModified":"2025-08-19T17:37:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/"},"wordCount":579,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png","keywords":["computer security","identity theft"],"articleSection":["Security News","Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/","name":"The biggest cyber security threats of 2014","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png","datePublished":"2014-12-29T23:38:26+00:00","dateModified":"2025-08-19T17:37:47+00:00","description":"From the Heartbleed bug to large-scale (and highly publicized) data breaches, Shellshock to mobile threats\u20142014 did not leave us wanting for more in the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/01\/614x300_Blog_40-Years-of-Internet.png","width":614,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2014-security-year-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"2014: Security Year in Review"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=40454"}],"version-history":[{"count":8,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40454\/revisions"}],"predecessor-version":[{"id":220726,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40454\/revisions\/220726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/163143"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=40454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=40454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=40454"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=40454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}