{"id":45595,"date":"2015-10-15T12:01:30","date_gmt":"2015-10-15T19:01:30","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=45595"},"modified":"2025-06-02T00:57:06","modified_gmt":"2025-06-02T07:57:06","slug":"hidden-data-economy-report-exposes-price-points-for-stolen-data","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/","title":{"rendered":"Hidden Data Economy Report Exposes Price Points for Stolen Data"},"content":{"rendered":"<p>McAfee today released <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/resource-library\/download-asset.html?eid=15Q3NAPROSM6753&amp;url=http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-hidden-data-economy.pdf\"><strong><em>The Hidden Data Economy<\/em><\/strong><\/a> report, which provides examples of how different types of stolen data is being packaged and offering prices for each type of data. McAfee Group\u2019s McAfee Labs organization examined pricing for stolen credit and debit card data, bank account login credentials, stealth bank transfer services, online payment service login credentials, premium-content-service login credentials, enterprise network login credentials, hospitality loyalty account login credentials, and online auction account login credentials.<\/p>\n<p>\u201cLike any unregulated, efficient economy, the cybercrime ecosystem has quickly evolved to deliver many tools and services to anyone aspiring to criminal behavior,\u201d said Raj Samani, CTO for McAfee in Europe, the Middle East, and Africa. \u201cThis \u2018cybercrime-as-a-service\u2019 marketplace has been a primary driver for the explosion in the size, frequency, and severity of cyberattacks. The same can be said for the proliferation of business models established to sell stolen data and make cybercrime pay.\u201d<\/p>\n<p>Through years of close work with law enforcement, the McAfee Labs team has monitored websites, chat rooms, and other online platforms, communities, and marketplaces where stolen data is bought and sold. McAfee Labs cannot confirm how many of the many examples of stolen data products and services are authentic. But drawing from the organization\u2019s work with law enforcement agencies over the years, its researchers have provided a \u201cstate of the cybercrime economy\u201d assessment with an illustration of key types and prices of data.<\/p>\n<h2><strong>Payment cards<\/strong><\/h2>\n<p>Payment card data is perhaps the best-known data type stolen and sold. McAfee Labs researchers found a value hierarchy in how this stolen data is packaged, priced, and sold in the dark market. A basic offering includes a software-generated valid number that combines a primary account number (PAN), an expiration date, and a CVV2 number. Sellers refer to a valid number combination as a \u201cRandom.\u201d Valid credit card number generators can be purchased or found for free online. Prices rise based on additional information that allows criminals to accomplish more things with the core data.<\/p>\n<p>This includes data such as the bank account ID number, the victim\u2019s date of birth, and information categorized as \u201cFullzinfo,\u201d including the victim\u2019s billing address, PIN number, social security number, date of birth, mother\u2019s maiden name, and even the username and password used to access, manage, and alter the cardholder\u2019s account online.<\/p>\n<p>The following table illustrates the average credit and debit card account sales prices across regions based on the combination of information made available:<\/p>\n<p>&nbsp;<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"207\"><strong>Package<\/strong><\/td>\n<td width=\"135\"><strong>U.S.<\/strong><\/td>\n<td width=\"135\"><strong>U.K.<\/strong><\/td>\n<td width=\"135\"><strong>Canada<\/strong><\/td>\n<td width=\"135\"><strong>Australia<\/strong><\/td>\n<td width=\"135\"><strong>EU<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"207\">Basic or \u201cRandom\u201d<\/td>\n<td width=\"135\">$5-$8<\/td>\n<td width=\"135\">$20-$25<\/td>\n<td width=\"135\">$20-$25<\/td>\n<td width=\"135\">$21-$25<\/td>\n<td width=\"135\">$25-$30<\/td>\n<\/tr>\n<tr>\n<td width=\"207\">With Bank ID#<\/td>\n<td width=\"135\">$15<\/td>\n<td width=\"135\">$25<\/td>\n<td width=\"135\">$25<\/td>\n<td width=\"135\">$25<\/td>\n<td width=\"135\">$30<\/td>\n<\/tr>\n<tr>\n<td width=\"207\">With Date of Birth<\/td>\n<td width=\"135\">$15<\/td>\n<td width=\"135\">$30<\/td>\n<td width=\"135\">$30<\/td>\n<td width=\"135\">$30<\/td>\n<td width=\"135\">$35<\/td>\n<\/tr>\n<tr>\n<td width=\"207\">With Fullzinfo<\/td>\n<td width=\"135\">$30<\/td>\n<td width=\"135\">$35<\/td>\n<td width=\"135\">$40<\/td>\n<td width=\"135\">$40<\/td>\n<td width=\"135\">$45<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>\u201cA criminal in posession of the digital equivalent of the physical card can make purchases or withdrawals until the victim contacts the card issuer and challenge the charges,\u201d continued Samani. \u201cProvide that criminal with extensive personal information used to verify the identity of a card holder, or even allow him to access the account and change the information, and the potential for extensive financial harm\u2014to the individual and card issuer\u2014goes up dramatically.\u201d<\/p>\n<h2><strong>Payment service accounts<\/strong><\/h2>\n<p>Compromised online payment service accounts appear to vary based solely on account balance, given their limited uses and scenarios for exploit. Account login credentials for accounts containing from US$400 to $1,000 have been estimated to cost between $20 and $50, while login credentials for accounts containing from $5,000 to $8,000 range from $200 to $300.<\/p>\n<h2><strong>Bank login credentials<\/strong><\/h2>\n<p>Cybercriminals can purchase banking login credentials and services allowing them to stealthily transfer stolen funds across international borders. McAfee Labs found login credentials for a $2,200 balance account selling for $190. Bank login credentials coupled with the ability to stealthily transfer funds to U.S. banks ranged from $500 for a $6,000 account balance, to $1,200 for a $20,000 account balance. United Kingdom transfers ranged from $700 for a $10,000 account balance, to $900 for a $16,000 account balance.<\/p>\n<h2><strong>Online premium content services<\/strong><\/h2>\n<p>The report also assesses dark market prices for account login credentials to online content services such as online video streaming($0.55 to $1), premium cable channel streaming services ($7.50), premium comic book services ($0.55), and professional sports streaming ($15). These relatively low price points suggest that cybercriminals have ramped up automated theft operations to make their cybercrime business models profitable.<\/p>\n<h2><strong>Loyalty, community accounts<\/strong><\/h2>\n<p>Some online services would appear to be low value targets, but researchers found that login credentials to hotel loyalty programs and online auction accounts are offered for sale on the dark market. Apparently, these allow buyers to conduct online purchases under the guise of their victims. McAfee Labs researchers found a major hotel brand loyalty account with 100,000 points for sale for $20, and an online auction community account with high reputation marks priced at $1,400.<\/p>\n<p>For more information, please read the full report: <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/resource-library\/download-asset.html?eid=15Q3NAPROSM6753&amp;url=http:\/\/www.mcafee.com\/us\/resources\/reports\/rp-hidden-data-economy.pdf\"><strong><em>The Hidden Data Economy<\/em><\/strong><\/a>.<\/p>\n<p>For guidance on how consumers can better protect themselves from the consequences of data breaches and the fraud and theft that follow, please visit: <strong><em><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/\">Consumer Blog<\/a><\/em><\/strong>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee today released The Hidden Data Economy report, which provides examples of how different types of stolen data is being&#8230;<\/p>\n","protected":false},"author":600,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,3946,76,142],"coauthors":[2994],"class_list":["post-45595","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-credit-card-fraud","tag-cybercrime","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-15T19:01:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T07:57:06+00:00\" \/>\n<meta name=\"author\" content=\"Chris Palm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Bulldog_Palm\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Palm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\"},\"author\":{\"name\":\"Chris Palm\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b\"},\"headline\":\"Hidden Data Economy Report Exposes Price Points for Stolen Data\",\"datePublished\":\"2015-10-15T19:01:30+00:00\",\"dateModified\":\"2025-06-02T07:57:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\"},\"wordCount\":818,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"credit card fraud\",\"cybercrime\",\"identity theft\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\",\"name\":\"Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2015-10-15T19:01:30+00:00\",\"dateModified\":\"2025-06-02T07:57:06+00:00\",\"description\":\"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Hidden Data Economy Report Exposes Price Points for Stolen Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b\",\"name\":\"Chris Palm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/dd0452ed764368de38e95e2fadf1c461\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g\",\"caption\":\"Chris Palm\"},\"description\":\"Chris Palm has 20 years of experience focused on the intersection of technology, business, and policy, where issues of security and privacy are shaping how technology impacts our lives. He has worked to tell these stories with technology leaders such as McAfee, VeriSign, Symantec, Entrust, Microsoft, Sun Microsystems, and Intel Security. As a director of corporate communications for McAfee, Chris manages executive public relations, thought leadership\/research, and crisis and issues communications for the organization\u2019s Office of the CTO, McAfee Labs, and the Advanced Threat Research group. Chris holds an MBA from Thunderbird School of Global Management and a BA in English Language and Literature from University of Southern California.\",\"sameAs\":[\"http:\/\/www.intelsecurity.com\",\"https:\/\/x.com\/@Bulldog_Palm\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/cpalm\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog","description":"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog","og_description":"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-10-15T19:01:30+00:00","article_modified_time":"2025-06-02T07:57:06+00:00","author":"Chris Palm","twitter_card":"summary_large_image","twitter_creator":"@Bulldog_Palm","twitter_site":"@McAfee","twitter_misc":{"Written by":"Chris Palm","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/"},"author":{"name":"Chris Palm","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b"},"headline":"Hidden Data Economy Report Exposes Price Points for Stolen Data","datePublished":"2015-10-15T19:01:30+00:00","dateModified":"2025-06-02T07:57:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/"},"wordCount":818,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","credit card fraud","cybercrime","identity theft"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/","name":"Hidden Data Economy Report Exposes Price Points for Stolen Data | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2015-10-15T19:01:30+00:00","dateModified":"2025-06-02T07:57:06+00:00","description":"The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/hidden-data-economy-report-exposes-price-points-for-stolen-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Hidden Data Economy Report Exposes Price Points for Stolen Data"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/207649ac39a514cf4909430626ea679b","name":"Chris Palm","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/dd0452ed764368de38e95e2fadf1c461","url":"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2b84a91b8c45c7a0096a954e84e5004?s=96&d=mm&r=g","caption":"Chris Palm"},"description":"Chris Palm has 20 years of experience focused on the intersection of technology, business, and policy, where issues of security and privacy are shaping how technology impacts our lives. He has worked to tell these stories with technology leaders such as McAfee, VeriSign, Symantec, Entrust, Microsoft, Sun Microsystems, and Intel Security. As a director of corporate communications for McAfee, Chris manages executive public relations, thought leadership\/research, and crisis and issues communications for the organization\u2019s Office of the CTO, McAfee Labs, and the Advanced Threat Research group. Chris holds an MBA from Thunderbird School of Global Management and a BA in English Language and Literature from University of Southern California.","sameAs":["http:\/\/www.intelsecurity.com","https:\/\/x.com\/@Bulldog_Palm"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/cpalm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/600"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=45595"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45595\/revisions"}],"predecessor-version":[{"id":214798,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45595\/revisions\/214798"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=45595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=45595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=45595"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=45595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}