{"id":40479,"date":"2015-01-02T06:00:37","date_gmt":"2015-01-02T14:00:37","guid":{"rendered":"http:\/\/blogs.mcafee.com\/?p=40479"},"modified":"2025-08-17T20:05:56","modified_gmt":"2025-08-18T03:05:56","slug":"game-of-thrones-file-sharing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/","title":{"rendered":"How Hackers Use Popular Shows to Infect Your Devices"},"content":{"rendered":"<p>If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit series, Game of Thrones (GoT), episodes are stolen about as often as weddings are ruined in the series. That is to say: all of the time.<\/p>\n<p><a href=\"https:\/\/torrentfreak.com\/most-pirated-tv-show-of-2014-141225\/\" target=\"_blank\" rel=\"noopener noreferrer\">Torrentfreak<\/a>, a website dedicated to file-sharing (the act of transmitting files from one computer to another over the Internet and often used to share \u00a0software, movies and other digital content without payment) news, has published its \u201cmost pirated\u201d TV show of 2014. As you may have guessed, Game of Thrones won\u2014for the third year in a row.<\/p>\n<p>Episodes of the heralded series, including the latest season, were <a href=\"https:\/\/torrentfreak.com\/most-pirated-tv-show-of-2014-141225\/\" target=\"_blank\" rel=\"noopener noreferrer\">downloaded more than eight million times<\/a> over BitTorrent, one such file-sharing service.<\/p>\n<p>That gargantuan tally, sadly, does not translate into any direct monetary gain for those who help make the show possible. But, (and in theme with GoT\u2019s appreciation for ruthless revenge) cast, crew and producers can take solace in the fact that a good deal of said thieves have probably downloaded <a href=\"http:\/\/securitywatch.pcmag.com\/none\/310063-game-of-thrones-torrents-are-perfect-for-delivering-malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a>\u2014malicious software designed to steal information and ruin computers\u2014in addition to stolen episodes.<\/p>\n<p>That\u2019s because shady sites like <a href=\"https:\/\/venturebeat.com\/2014\/12\/30\/the-pirate-bay-story-will-continue-in-2015\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Pirate Bay<\/a> (which offers free downloads of pretty much anything), and services, like BitTorrent, often unwittingly promote and spread malware as well as other viruses. This can happen in a few ways:<\/p>\n<p>First, and most obvious, is through malware and viruses found on the site, masquerading as more innocuous file types, such as a video. File-sharing sites operate on the honor system, allowing any type of user to upload and download content freely. You can bet that some users are going to upload malware to the site to be downloaded by unwary users later.<\/p>\n<p>The second way is by hosting suspicious advertisements. Open-source sites like BitTorrent use side banners and popup ads just like any other page on the Internet. These <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/stop-malvertisements-from-causing-a-click-tastrophe-on-your-computer\/\" target=\"_blank\" rel=\"noopener noreferrer\">malvertisements<\/a> may look like other ads, but direct users to malicious sites, where they\u2019ll then have data stolen and malware pushed to their devices. While site operators do have some control over ads shown, most cannot court big time products, like <a href=\"https:\/\/www.ibtimes.com\/pirate-bay-malware-torrent-site-has-free-movies-virus-might-be-included-1697095\" target=\"_blank\" rel=\"noopener noreferrer\">Nike or BMW<\/a>, due to the nature of their service, and so look to less reputable advertisers to fill the gaps.<\/p>\n<p>Finally, stealthy crooks can embed a malware program in the product the user is looking for\u2014such as a Game of Thrones episode. Usually this is limited to software, but hackers can also use video files to spread their malware by instructing the user to download additional applications or files in order to play the video in question.<\/p>\n<h2>How to Protect Yourself from Online Betrayal:<\/h2>\n<ul>\n<li><strong>Don\u2019t download illegal content. <\/strong>This should be simple. Don\u2019t take what doesn\u2019t belong to you. If you do, you run the risk of not only coming afoul of the law, but also infecting your devices with malware capable of stealing passwords, bank account numbers and a variety of personal information. When downloading video, music, applications and other such files, you are always safer using a known, legitimate source such as the iTunes or Google Play stores.<\/li>\n<li><strong>Steer clear of file-sharing sites. <\/strong>Such open-source warehouses for digital content cannot be trusted for the reasons listed earlier. Where there is little policing of the content that is uploaded, malware is sure to get in the door. Protect yourself and your devices by only visiting sites that have regulated content from trusted sources.<\/li>\n<li><strong>Use comprehensive security.<\/strong> Regardless of what type of online activity you choose to participate in, you should always have a sound security solution employed on your devices. Solutions like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service can help protect you from malware and other bad things lurking online, across all of your devices including your PCs, Macs, smartphones and tablets<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following <a href=\"https:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">myself<\/a> and <a href=\"https:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> on Twitter, and Like us on <a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online&#8230;.<\/p>\n","protected":false},"author":674,"featured_media":217336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4060,3949,180,4535],"coauthors":[3973],"class_list":["post-40479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-consumer-threat-notice","tag-cybersafety","tag-malware","tag-virus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog<\/title>\n<meta name=\"description\" content=\"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-02T14:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-18T03:05:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How Hackers Use Popular Shows to Infect Your Devices\",\"datePublished\":\"2015-01-02T14:00:37+00:00\",\"dateModified\":\"2025-08-18T03:05:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\"},\"wordCount\":680,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"keywords\":[\"Consumer Threat Notice\",\"cybersafety\",\"malware\",\"virus\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\",\"name\":\"How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"datePublished\":\"2015-01-02T14:00:37+00:00\",\"dateModified\":\"2025-08-18T03:05:56+00:00\",\"description\":\"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"width\":614,\"height\":409,\"caption\":\"Convert PDF files with online programs. Users convert document files on a platform using an internet connection at desks. concept of technology transforms documents into portable document formats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Hackers Use Popular Shows to Infect Your Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog","description":"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog","og_description":"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-01-02T14:00:37+00:00","article_modified_time":"2025-08-18T03:05:56+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How Hackers Use Popular Shows to Infect Your Devices","datePublished":"2015-01-02T14:00:37+00:00","dateModified":"2025-08-18T03:05:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/"},"wordCount":680,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","keywords":["Consumer Threat Notice","cybersafety","malware","virus"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/","name":"How Hackers Use Popular Shows to Infect Your Devices | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","datePublished":"2015-01-02T14:00:37+00:00","dateModified":"2025-08-18T03:05:56+00:00","description":"If there\u2019s one reasonable measurement of how popular a television series has become, it\u2019s how often it\u2019s illegally downloaded online. And for HBO\u2019s hit","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","width":614,"height":409,"caption":"Convert PDF files with online programs. Users convert document files on a platform using an internet connection at desks. concept of technology transforms documents into portable document formats."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/game-of-thrones-file-sharing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How Hackers Use Popular Shows to Infect Your Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=40479"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40479\/revisions"}],"predecessor-version":[{"id":220038,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/40479\/revisions\/220038"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/217336"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=40479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=40479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=40479"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=40479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}