{"id":45460,"date":"2015-09-28T22:00:29","date_gmt":"2015-09-29T05:00:29","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=45460"},"modified":"2025-08-31T22:40:05","modified_gmt":"2025-09-01T05:40:05","slug":"most-dangerous-celebrities-2015","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/","title":{"rendered":"The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance"},"content":{"rendered":"<p>Who doesn\u2019t love to search for celebrities online? From red carpet photos, to clips of the latest fashion faux pas, Hollywood gossip on the Web has a lot of us hooked. But sometimes, our interest in the stars can lead us into the digital danger zone. Cybercriminals take advantage of our interest in celebrities by riddling search results with links to sites that may host malware and other online threats that can steal personal data and harm our devices.<\/p>\n<p>McAfee conducted a study using <a href=\"https:\/\/home.mcafee.com\/root\/landingpage.aspx?lpname=get-it-now&amp;affid=0&amp;cid=170789\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u00ae WebAdvisor<\/a> to determine the number of risky sites that would be generated in search results including a celebrity name and commonly searched terms. We refer to these stars as the <a href=\"https:\/\/www.mcafee.com\/us\/about\/news\/2015\/q3\/20150929-01.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Most Dangerous Celebrities\u2122<\/a>, meaning that they are likely popular search subjects. \u00a0And this year\u2019s roundup is seeing some new, surprising faces. Not so surprising is the Netherlands native who\u2019s taken our No. 1 spot, up from his No. 2 placement in 2014: world famous DJ, Armin van Buuren.<\/p>\n<p>So, how dangerous is it exactly to search for the trance music legend? To be precise, searching for van Buuren presents a 17.92% chance of running into online threats \u2014 if a user clicked all the results generated by the search terms. That\u2019s nearly a 1 in 5 chance of landing on a site that has \u2018malicious\u2019 written all over it.<\/p>\n<p>Other stars that made the cut this year include Luke Bryan (No. 2),\u00a0 Usher (No. 3), and Britney Spears (No. 4). It goes without saying that hackers have picked up on our love of music, with 7 of the top 10 Most Dangerous Celebrities this year being musical artists.<\/p>\n<p>What makes musicians such a focus for cybercriminals? Well, unassuming music fans tend to turn to the Web to find downloads of their favorite tunes\u2014most often in the form of .mp3 files. That said, cybercriminals might use the terms \u2018free mp3\u2019 or \u2018torrent\u2019 to entice you to download a seemingly-legitimate file that is, in reality, malicious. In the case of our No. 1 Most Dangerous Celebrity, search terms like \u201cHD download \u201cand \u201ctorrent\u201d combined with \u201cArmin van Buuren\u201d are hotbeds for hacker hoaxes.<\/p>\n<h2>Things to Keep Yourself Safe<\/h2>\n<p>Cybercriminals will continue to innovate, looking for new ways to take advantage of our interest in pop culture to steal personal information. \u00a0Luckily, there are a few things you can do to keep yourself safe:<\/p>\n<ul>\n<li><strong>Only download from verified sites<\/strong>. Don\u2019t download anything from a website you don\u2019t trust. If it looks suspicious, your hunch about its legitimacy is probably right. Access content directly from reputable sources, such as Apple Music and Google Play Music.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be strict when sharing your personal information.<\/strong> If you receive a message from an unknown website asking for your log-in, or requesting other personal information, about face. Cybercriminals often pose as legitimate companies to scoop up your sensitive information via email, text, or other methods of communication. Be wary of these <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> tactics to avoid becoming a victim of identity theft.<\/li>\n<\/ul>\n<ul>\n<li><strong>Let an online safety advisor be your guide. <\/strong>When it\u2019s hard to tell if a site is legitimate, a web advisor can help. Online tools like <a href=\"https:\/\/home.mcafee.com\/root\/landingpage.aspx?lpname=get-it-now&amp;affid=0&amp;cid=170789\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u00ae WebAdvisor<\/a> can alert you of risky sites before you click, and protect you from threats like malware and browser exploits.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security.\u00a0<\/strong>Whether you follow celebrity gossip or not, it\u2019s always a good idea to protect your devices from potential infection. Comprehensive security solutions like\u00a0<a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a>\u00a0can safeguard your devices by diverting you from dangerous downloads.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following <a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">me<\/a> and <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> on Twitter, and Like us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who doesn\u2019t love to search for celebrities online? From red carpet photos, to clips of the latest fashion faux pas,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":209460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,8050],"tags":[1814,76,3952,180],"coauthors":[3973],"class_list":["post-45460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mcafee-news","tag-computer-security","tag-cybercrime","tag-internet-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs<\/title>\n<meta name=\"description\" content=\"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs\" \/>\n<meta property=\"og:description\" content=\"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-29T05:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:40:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/MDC-2015_Infographic_EN-US_FINAL.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance\",\"datePublished\":\"2015-09-29T05:00:29+00:00\",\"dateModified\":\"2025-09-01T05:40:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\"},\"wordCount\":617,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg\",\"keywords\":[\"computer security\",\"cybercrime\",\"internet security\",\"malware\"],\"articleSection\":[\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\",\"name\":\"Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg\",\"datePublished\":\"2015-09-29T05:00:29+00:00\",\"dateModified\":\"2025-09-01T05:40:05+00:00\",\"description\":\"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs","description":"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs","og_description":"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-09-29T05:00:29+00:00","article_modified_time":"2025-09-01T05:40:05+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/MDC-2015_Infographic_EN-US_FINAL.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance","datePublished":"2015-09-29T05:00:29+00:00","dateModified":"2025-09-01T05:40:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/"},"wordCount":617,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg","keywords":["computer security","cybercrime","internet security","malware"],"articleSection":["Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/","name":"Introducing the Most Dangerous Celebrity of 2015 - McAfee Blogs","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg","datePublished":"2015-09-29T05:00:29+00:00","dateModified":"2025-09-01T05:40:05+00:00","description":"McAfee conducted a study to determine the Most Dangerous Celebrities to search for online. Here are the results.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/pexels-shvetsa-4226215-1.jpg","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-dangerous-celebrities-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The 2015 Most Dangerous Celebrity is Putting Devices in a State of Trance"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=45460"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45460\/revisions"}],"predecessor-version":[{"id":221933,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45460\/revisions\/221933"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/209460"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=45460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=45460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=45460"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=45460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}