{"id":41466,"date":"2015-02-23T21:00:08","date_gmt":"2015-02-24T05:00:08","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=41466"},"modified":"2025-08-31T22:54:09","modified_gmt":"2025-09-01T05:54:09","slug":"february-2015-threats-report","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/","title":{"rendered":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk"},"content":{"rendered":"<p>Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the <em>McAfee Labs Threats Report<\/em> covers threats to both mobile and desktop devices. But, as you\u2019ll soon see, the distinction between mobile and desktop threats is slowly becoming irrelevant thanks to three key issues: potentially unwanted programs (PUPs), <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware,<\/a> and unpatched app vulnerabilities. Let\u2019s take a quick dive into these areas and learn how you can protect yourself from each threat.<\/p>\n<h2><strong>Potentially Unwanted Programs<\/strong><\/h2>\n<p>The first threat, PUPs, revolves around apps and programs that change system settings and gather personal information without a user\u2019s knowledge. Although this sounds inherently malicious, not all PUPs are bad. They reside in a tricky \u201cgray zone\u201d in which developers sometimes have reasonable justifications for their behavior and sometimes do not. But the basic issue remains the same regardless of intentions: PUPs modify system settings, browser settings, covertly collect user information, and go to lengths to disguise their presence. What you need to know is that your latest program or application may be collecting more information about you than you expected.<\/p>\n<p>For mobile devices, PUPs usually take the form of knock-off apps. That is, they emulate and piggyback on the appearance and purpose of legitimate, popular apps while gaining permissions and collecting data on your activities. Often, they try to push you to other services or, in some cases, install software that directs your <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/installcube-how-russian-programmers-turn-adware-into-cash\/\" target=\"_blank\" rel=\"noopener noreferrer\">device towards ads<\/a> based on your browsing history.<\/p>\n<p>Because of their ambiguous nature, PUPs are becoming a troubling area for the cybersecurity community. They\u2019re difficult to define and analyze. But for consumers like you, there are a few things you can do. The first is to keep an eye out for suspicious programs that are almost, but not quite, like a well-known and popular application. For desktop and laptop computers, you should avoid both app packages and third-party app stores.<\/p>\n<h2><strong>Ransomware<\/strong><\/h2>\n<p>Ransomware, the report\u2019s second topic area, has been an area of concern for some time. While ransomware\u2014malicious programs that restrict access to your files and programs until a ransom is paid\u2014 fell in the third quarter of 2014, the threat experienced resurgence last quarter, when the number of new ransomware samples grew by 155%. That means there are more than two million ransomware samples in the world right now. It also means that more people are at risk of losing access to their devices and data than ever before.<\/p>\n<p>Unlike other malicious programs, ransomware, once installed, is quite obvious. Your device, be it a laptop, desktop or mobile phone, will show a pop-up that notifies you of blocked access. In order to regain access to your device, documents, or both, the ransomware will then demand a\u2014you guessed it\u2014ransom. Do not give in to this request.<\/p>\n<p>You can avoid falling victim to ransomware programs by using a comprehensive security solution like <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service and avoiding suspicious files and apps. You can also avoid paying ransom for your files by keeping backups of your documents on a cloud backup service or on a hard drive that isn\u2019t connected to your computer. For your mobile devices, keeping a clean backup helps, as does limiting what permissions your apps have access to.<\/p>\n<h2><strong>Mobile Vulnerabilities Go Unaddressed<\/strong><\/h2>\n<p>The final highlight from McAfee Labs, vulnerabilities on <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/quick-look-at-the-current-threat-landscape\" target=\"_blank\" rel=\"noopener noreferrer\">mobile devices<\/a>, have been in the limelight for some time. But in Q4, the topic grew more complex: Along with a 14% growth in the number of mobile <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> samples in the wild, we\u2019re also seeing app developers ignoring known vulnerabilities when securing their app communications. They\u2019re releasing and maintaining apps with troubling cryptographic vulnerabilities that could help cybercriminals establish <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/gogo-hacking-customers\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-middle attacks<\/a>.<\/p>\n<p>A <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/man-in-the-middle-attack\" target=\"_blank\" rel=\"noopener noreferrer\">man-in-the-middle attack<\/a>, or MITM, happens when an attacker intercepts messages and data sent between a victim and its intended recipients. Cybercriminals do this by abusing a complex network of certificates used to validate traffic, essentially setting up a detour route through the attacker\u2019s home turf so they can monitor information. The sought after information often includes usernames and passwords\u2014though data like geolocation and browsing habits can be included too.<\/p>\n<p>But here\u2019s the thing with MITM attacks on both mobile and desktop devices: They can be fixed fairly easily, but they often aren\u2019t. There is no good reason for this. Developers need to step up their security game and knock out any known vulnerabilities that could harm consumers.<\/p>\n<p>Thankfully, there are steps users can take to stay safe on their mobile devices:<\/p>\n<ul>\n<li><strong>Use known app stores. <\/strong>Sticking to known app stores, like the Apple App Store or Google Play, will go a long way to assuring both quality and maintained apps.<\/li>\n<\/ul>\n<ul>\n<li><strong>Limit app use.<\/strong> Users should use apps only when they\u2019re connected to known and trusted Wi-Fi networks like the ones you\u2019d find at your home or work. Limiting your exposure elsewhere can help keep your passwords private.<\/li>\n<\/ul>\n<ul>\n<li><strong>Enable multifactor authentication.\u00a0<\/strong>I\u2019ve discussed the benefits of\u00a0two-factor authentication\u00a0before, but it bears repeating: Having your online presence verified by both something you know (like a password) and something you have (like a smartphone) is one of the strongest methods of preventing unauthorized access to your account.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following <a href=\"https:\/\/www.twitter.com\/McAfee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> and <a href=\"https:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">myself<\/a> on Twitter and Like us on <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee&#8230;<\/p>\n","protected":false},"author":674,"featured_media":129703,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,8050],"tags":[76,4141,4140],"coauthors":[3973],"class_list":["post-41466","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mcafee-news","tag-cybercrime","tag-mcafee-labs-report","tag-quarterly-threats-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-24T05:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:54:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk\",\"datePublished\":\"2015-02-24T05:00:08+00:00\",\"dateModified\":\"2025-09-01T05:54:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\"},\"wordCount\":914,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"keywords\":[\"cybercrime\",\"McAfee Labs Report\",\"Quarterly Threats Report\"],\"articleSection\":[\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\",\"name\":\"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"datePublished\":\"2015-02-24T05:00:08+00:00\",\"dateModified\":\"2025-09-01T05:54:09+00:00\",\"description\":\"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"width\":614,\"height\":300,\"caption\":\"virus scan looking for malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog","description":"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog","og_description":"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-02-24T05:00:08+00:00","article_modified_time":"2025-09-01T05:54:09+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk","datePublished":"2015-02-24T05:00:08+00:00","dateModified":"2025-09-01T05:54:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/"},"wordCount":914,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","keywords":["cybercrime","McAfee Labs Report","Quarterly Threats Report"],"articleSection":["Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/","name":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","datePublished":"2015-02-24T05:00:08+00:00","dateModified":"2025-09-01T05:54:09+00:00","description":"Every quarter McAfee\u00a0 releases a report on the cybersecurity issues confronting consumers, business partners, and the public. Produced by McAfee Labs, the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","width":614,"height":300,"caption":"virus scan looking for malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/february-2015-threats-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Ransomware, PUPs, Vulnerabilities: a Look at What\u2019s Putting You at Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=41466"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41466\/revisions"}],"predecessor-version":[{"id":221942,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41466\/revisions\/221942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/129703"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=41466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=41466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=41466"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=41466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}