{"id":41658,"date":"2015-04-09T05:05:56","date_gmt":"2015-04-09T12:05:56","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=41658"},"modified":"2025-08-31T22:49:49","modified_gmt":"2025-09-01T05:49:49","slug":"what-a-botnet-is","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/","title":{"rendered":"Here\u2019s What You Need To Know About Botnets"},"content":{"rendered":"<p>In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would simulate how <a href=\"http:\/\/en.wikipedia.org\/wiki\/Protein_folding\" target=\"_blank\" rel=\"noopener noreferrer\">protein molecules fold<\/a>\u2014a necessary and important part of drug research. But protein folding is a complicated process, requiring a lot of computing power to do the simplest of recreations. Pande\u2019s program, however, distributed that computing burden among thousands of personal computers. All of the sudden, researchers had a cheap way of doing expensive research.<\/p>\n<p>Pande, in essence, created a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/identity-protection\/what-is-a-botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>.<\/p>\n<p>A botnet is a network of personal computers working together to accomplish a given task. The term botnet is used because these automated programs, called robots or \u201cbots\u201d are spread across a network of computers. These computers are often controlled through a server\u2014a computer acting as a communication resource for other devices. In the case of botnets, this server is often called a command and control server. It is central to running and maintaining a botnet.<\/p>\n<p>On their own, individual bots are fairly weak programs. In aggregate, however, botnets can be very powerful. And very damaging.<\/p>\n<p>Unscrupulous characters often use botnets to power a variety of illegal projects. <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/denial-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">Denial-of-Service Attacks<\/a> (DoS), where infected computers flood a webpage with traffic to knock it offline, are one common use of botnets. These attacks can, and do, cost businesses millions of dollars in losses in a short period of time. Malicious botnets are also used to distribute viruses, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/pony-botnet-steals-2-million-passwords\" target=\"_blank\" rel=\"noopener noreferrer\">steal passwords<\/a> and propagate spam. Botnets, for the most part, are effective, cheap ways for cybercriminals to compel computers to do bad things.<\/p>\n<p>We recently worked with the United States Department of Justice and other security firms to take down a botnet named \u201c<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/zeus-cryptolocker-game-over\" target=\"_blank\" rel=\"noopener noreferrer\">Gameover Zeus<\/a>.\u201d Gameover Zeus stole personal information like bank account passwords and usernames. The botnet was also used to distribute Cryptolocker\u2014a type of <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">malicious program<\/a> called \u201cransomware.\u201d <a href=\"https:\/\/www.mcafee.com\/learn\/ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware<\/a> essentially holds a computer hostage until its owner pays a ransom to the cybercriminal.<\/p>\n<p>In its press release, <a href=\"http:\/\/www.justice.gov\/opa\/pr\/us-leads-multi-national-action-against-gameover-zeus-botnet-and-cryptolocker-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">the Department of Justice estimated<\/a> that Gameover Zeus and Cryptolocker caused more than $100 million and $27 million in damages, respectively. The botnet\u2019s creator, identified as Evgeniy Mikhailovich Bogachev, is now wanted by the Federal Bureau of Investigation.<\/p>\n<p>So yes. Botnets can be very bad. They can also be very good. Professor Pande\u2019s program, <a href=\"http:\/\/folding.stanford.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Folding at Home<\/a>, has helped researchers better understand diseases like Alzheimer\u2019s and Huntington\u2019s\u2014which in turn will help develop treatments. The critical difference here, other than intent, is consent. Participants in Folding at Home knowingly download the program in order to help it achieve its end goal: better medical treatments. Botnets, however, rob victims of that consent and exploit this robbery further by stealing and selling personal information.<\/p>\n<h2>Steps to Protect Yourself from Botnets<\/h2>\n<p>So what can you do to protect yourself from botnets? Well, thankfully, there are a few steps you can take:<\/p>\n<ul>\n<li><strong>Always use a comprehensive security solution. <\/strong>Comprehensive security solutions, like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> service, are critical in detecting and deterring the programs that make botnets possible. By preventing unwanted access to your computer, you can help to stunt the spread of botnets.<\/li>\n<li><strong>Keep your software up to date.<\/strong> Always update your devices. Software updates include more than just the latest features\u2014they also include the latest security fixes. When you update, you\u2019re protecting yourself from cybercriminals who want to use your computer against you and others.<\/li>\n<li><strong>Watch where you browse.\u00a0<\/strong>The Internet can be a dangerous place. Browser-based exploits found on compromised websites can inject malicious code onto your computer. Keystrokes, passwords and other personal information like credit card data can be recorded and shipped to servers across the globe. The best way to prevent these exploits from taking advantage of you and your computer is to stay on safe websites. Do this by sticking to websites you know and those sites that appear on the first few pages of search results.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following <a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> and <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">myself<\/a> on Twitter and Like us on <a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-39005 size-thumbnail\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg\" alt=\"GaryNasdaq_NCSA_Conference_panel small\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded&#8230;<\/p>\n","protected":false},"author":674,"featured_media":21479,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[49,76],"coauthors":[3973],"class_list":["post-41658","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-botnet","tag-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are botnets and how do they work?<\/title>\n<meta name=\"description\" content=\"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are botnets and how do they work?\" \/>\n<meta property=\"og:description\" content=\"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-09T12:05:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:49:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1452\" \/>\n\t<meta property=\"og:image:height\" content=\"1523\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Here\u2019s What You Need To Know About Botnets\",\"datePublished\":\"2015-04-09T12:05:56+00:00\",\"dateModified\":\"2025-09-01T05:49:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png\",\"keywords\":[\"botnet\",\"cybercrime\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\",\"name\":\"What are botnets and how do they work?\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png\",\"datePublished\":\"2015-04-09T12:05:56+00:00\",\"dateModified\":\"2025-09-01T05:49:49+00:00\",\"description\":\"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png\",\"width\":1003,\"height\":501},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Here\u2019s What You Need To Know About Botnets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are botnets and how do they work?","description":"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What are botnets and how do they work?","og_description":"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-04-09T12:05:56+00:00","article_modified_time":"2025-09-01T05:49:49+00:00","og_image":[{"width":1452,"height":1523,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/GaryNasdaq_NCSA_Conference_panel-small.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Here\u2019s What You Need To Know About Botnets","datePublished":"2015-04-09T12:05:56+00:00","dateModified":"2025-09-01T05:49:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/"},"wordCount":692,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png","keywords":["botnet","cybercrime"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/","name":"What are botnets and how do they work?","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png","datePublished":"2015-04-09T12:05:56+00:00","dateModified":"2025-09-01T05:49:49+00:00","description":"In the year of 2000, Professor Vijay Pande, a renowned Stanford University researcher, released a little program that, when downloaded by a user, would","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/01\/heatmap_botnet_1222013.png","width":1003,"height":501},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/what-a-botnet-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Here\u2019s What You Need To Know About Botnets"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=41658"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41658\/revisions"}],"predecessor-version":[{"id":221940,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/41658\/revisions\/221940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/21479"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=41658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=41658"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=41658"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=41658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}