{"id":44443,"date":"2015-07-17T09:23:53","date_gmt":"2015-07-17T16:23:53","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=44443"},"modified":"2025-08-31T22:45:57","modified_gmt":"2025-09-01T05:45:57","slug":"social-networks-but-for-botnets","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/","title":{"rendered":"Social Media Swamped by Social Botnets"},"content":{"rendered":"<p>As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years. A recent <a href=\"http:\/\/www.businessinsider.com\/italian-security-researchers-find-8-percent-of-instagram-accounts-are-fake-2015-7\" target=\"_blank\" rel=\"noopener noreferrer\">study<\/a> revealed nearly 8% of Instagram accounts are spambots. A problem for marketers, sure, but it\u2019s even worse for you. Creating a robot network, or <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/identity-protection\/what-is-a-botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a>, used to involve hacking into thousands of computers and wresting control of them from their unsuspecting owners over a long period of time. Cybercriminals have now discovered an even easier and faster way to create their malicious networks that will carry out their malicious plots: the social botnet.<\/p>\n<p>Unlike traditional botnets that directly infect computers to create networks, social botnets use social media platforms to create a network of fake profiles linked together to spread malicious links and content. To do this, cybercriminals either create hundreds of profiles themselves or use specially designed software programs to create and multiply false personalities.<\/p>\n<p>James Foster, a longtime cybersecurity pro, has an excellent <a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/the-rise-of-social-media-botnets\/a\/d-id\/1321177\" target=\"_blank\" rel=\"noopener noreferrer\">breakdown<\/a> on social botnets and how they work. According to Foster, there are five distinct ways social botnet \u201cherders\u201d promote their wares. I\u2019ll break down three of the most common\u2014phishing attacks, retweet storms and hashtag hijacking.<\/p>\n<h2><strong>Phishing Attacks<\/strong><\/h2>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing attacks<\/a>, in which cybercriminals pose as a trusted source to trick victims into giving up sensitive information, are often launched via email. Increasingly, however, they\u2019re coming through social channels. This includes Facebook messages or Twitter replies and direct messages. Most people know how to spot these types of phishing messages, but botnet operators play a numbers game; send out thousands of messages on social media platforms and a few unsuspecting users will wind up being snared.<\/p>\n<h2><strong>Retweet Storms <\/strong><\/h2>\n<p>Another way cybercriminals disseminate malicious links is through retweet storms. In this scenario, a single fake profile will create a post containing a malicious link. Thousands of social bots connected to the profile will then retweet the post to reach the widest audience possible, aiming to lure in unsuspecting victims through the post\u2019s staged popularity.<\/p>\n<h2><strong>Hashtag Hijacks <\/strong><\/h2>\n<p>Social bots can also be used to infiltrate conversations on social networks centered around trending hashtags. Cybercriminals will command their social bots to create thousands of posts containing the trending hashtag along with a malicious link, knowing that someone will wind up clicking.<\/p>\n<p>So, how are these social botnets being monetized? The social bot herders mainly make money from the data extracted through their malicious expeditions. They often sell this data to cybercriminal networks, or use the data themselves to access victims\u2019 credit cards or bank accounts. Other times, hackers use the malware installed on computers through a social botnet to create a traditional botnet. They can then rent that botnet out to cybercriminals, or use it themselves to hack into other computer networks.<\/p>\n<p>Simply put, social botnets are on the rise and there\u2019s little to we can do to stop them at this time. There are, however, tactics you can use to keep yourself safe online:<\/p>\n<ul>\n<li><strong>Enable two-factor authentication.\u00a0<\/strong>I\u2019ve discussed the benefits of\u00a0two-factor authentication\u00a0repeatedly, but it truly is one of the best ways to protect yourself. It protects accounts by asking you to provide verification with something you know (like a password) and something you have (like a smartphone). It\u2019s one of the strongest methods of preventing unauthorized access to your information, and can help keep cybercriminals out of your accounts in the event of a social botnet attack.<\/li>\n<\/ul>\n<ul>\n<li><strong>Beware of suspicious messages.\u00a0<\/strong>Phishing\u00a0attacks often rely on a victim\u2019s trust of a company or organization, but most attempts are detectable. Grammar mistakes, messages from strangers or a strange request from someone you haven\u2019t talked to in years are good indicators. If you\u2019d like to brush up on your phony message detection skills, try our\u00a0<a href=\"http:\/\/www.cbsnews.com\/news\/mcafee-intel-security-phishing-quiz-can-you-spot-a-scam-dont-be-so-sure\/\" target=\"_blank\" rel=\"noopener noreferrer\">Phishing Quiz here<\/a>.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security.\u00a0<\/strong>Most attacks hinge on the ability to install <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> onto your device. Thankfully, you can protect all of your devices from this malicious software with comprehensive security solutions like\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a>.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following <a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> and <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">myself<\/a> on Twitter, and Like us on <a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-43386\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As anyone with a newsfeed will tell you, fake social media accounts have been on the rise in recent years&#8230;.<\/p>\n","protected":false},"author":674,"featured_media":64206,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[49,3952,4222],"coauthors":[3973],"class_list":["post-44443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-botnet","tag-internet-security","tag-social-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Media Swamped by Social Botnets | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Media Swamped by Social Botnets | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-17T16:23:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:45:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Social Media Swamped by Social Botnets\",\"datePublished\":\"2015-07-17T16:23:53+00:00\",\"dateModified\":\"2025-09-01T05:45:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\"},\"wordCount\":701,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"keywords\":[\"botnet\",\"internet security\",\"social media\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\",\"name\":\"Social Media Swamped by Social Botnets | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"datePublished\":\"2015-07-17T16:23:53+00:00\",\"dateModified\":\"2025-09-01T05:45:57+00:00\",\"description\":\"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg\",\"width\":1000,\"height\":563,\"caption\":\"botnet visual representation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Media Swamped by Social Botnets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media Swamped by Social Botnets | McAfee Blog","description":"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Social Media Swamped by Social Botnets | McAfee Blog","og_description":"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-07-17T16:23:53+00:00","article_modified_time":"2025-09-01T05:45:57+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Social Media Swamped by Social Botnets","datePublished":"2015-07-17T16:23:53+00:00","dateModified":"2025-09-01T05:45:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/"},"wordCount":701,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","keywords":["botnet","internet security","social media"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/","name":"Social Media Swamped by Social Botnets | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","datePublished":"2015-07-17T16:23:53+00:00","dateModified":"2025-09-01T05:45:57+00:00","description":"A social botnet uses social media platforms to create a network of fake profiles linked together to spread malicious links and content. More in this blog.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Botnet1.jpg","width":1000,"height":563,"caption":"botnet visual representation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-networks-but-for-botnets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Social Media Swamped by Social Botnets"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=44443"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44443\/revisions"}],"predecessor-version":[{"id":221937,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44443\/revisions\/221937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/64206"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=44443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=44443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=44443"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=44443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}