{"id":45981,"date":"2015-11-10T06:00:52","date_gmt":"2015-11-10T14:00:52","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=45981"},"modified":"2025-08-15T07:53:29","modified_gmt":"2025-08-15T14:53:29","slug":"most-hackable-holiday-gifts-2015","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/","title":{"rendered":"Introducing the \u2018Most Hackable&#8217; Gifts of the Holiday Season"},"content":{"rendered":"<p>It\u2019s that time of year again: the time for a gauntlet of ads, shopping trips, and crowds as we begin the holiday season. Like most years, gift-givers will be looking for the latest and greatest in toys and tech gadgets for those on their list. Many of these connect to the Internet or other devices, putting them in the security spotlight. These \u2018most hackable\u2019 gifts represent some of this holiday season\u2019s popular gifts that present a risk if not properly secured.<\/p>\n<p>A lot of this year\u2019s hot-ticket tech items \u00ad\u2014 everything from wearable fitness trackers to smartwatches, action cameras and drones \u2014 are appealing, not just you and me, but to cybercriminals as well.<\/p>\n<p>Luckily, these popular gifts can be better secured with a few simple actions \u2013 you can start by being aware of the risks and be thoughtful about securing your new \u201ctoys.\u201d<\/p>\n<p>Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.<\/p>\n<h2><strong>Smartwatches and Fitness Trackers <\/strong><\/h2>\n<p>This is the year of the wearable device. Smartwatches and fitness trackers are an exciting new area for the consumer Internet of Things, and promise to be high up on many wish lists for seasons to come. But because most wearable devices today lack significant security built into the devices themselves, they can be an attractive target for cybercriminals.<\/p>\n<p>Now, most wearable devices don\u2019t actually contain much in the way of usable data for cybercriminals, but most provide a connection to both smartphones and computers. By exploiting this connection, cybercriminals can mine devices for contact information and, in some cases, install <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\" target=\"_blank\" rel=\"noopener\">malicious software<\/a> (malware). Many consumers underestimate the amount of data that wearable devices collect, so it\u2019s important to be mindful of how much personal information you are giving any apps associated with your wearables, in the case that a device or account is compromised.<\/p>\n<p>We at\u00a0McAfee \u00a0know that it\u2019s possible for cybercriminals to leverage the weaknesses in Bluetooth in order to steal data. \u00a0Moreover, some devices use default pairing passwords for Bluetooth, like 0000 or 1234, allowing cybercriminals to pair and gain access to a device.\u00a0 When cybercriminals get a person\u2019s username and email address they may use this data to launch \u00a0spear-phishing attacks \u2014 \u00a0where cybercriminals pose as a familiar entity in an effort to steal sensitive data \u2014 or even identities.<\/p>\n<h2><strong>Smartphones and Tablets<\/strong><\/h2>\n<p>With the excitement of getting new devices, consumers often are so eager to begin using them that they do not take time to properly secure them. For example, some devices use default pairing passwords for Bluetooth, like 0000 or 1234, allowing cybercriminals to pair and gain access to a device. Much like the aforementioned smartwatches and fitness trackers, cybercriminals could use this connection to mine contact data and spread malware.<\/p>\n<h2><strong>Drones and Camera-enabled Devices <\/strong><\/h2>\n<p>As expected, drones and remote controlled cameras are popular gift ideas this year as well. According to the Consumer Electronics Association, the U.S. market for drones should approach $105 million in revenue in 2015 alone. But remote cameras and drones may also be targets for many hackers today. Without proper security, these types of devices can give the wrong people access to personal data that you would not want to be shared.<\/p>\n<p>Default passwords can give cybercriminals access to your device. Many users simply forget, or don\u2019t know how, to change passwords after logging into their new devices for the first time. Always examine a device\u2019s instructions, or refer to online guides, to change factory setting passwords immediately.<\/p>\n<h2><strong>Children\u2019s Gadgets<\/strong><\/h2>\n<p>Finally, there will be many Internet-connected children\u2019s toys this year. That means parents will need to take the time to understand how a toy \u2014 be it a remote control car or a doll \u2014 connects and interacts with the online world. If a toy does have Internet connectivity, learn how you can change its default password or manage settings to restrict what it broadcasts to the Internet.<\/p>\n<p>So, what can you do to keep your gifted gadgets safer? Here are a few simple steps you can take:<\/p>\n<p><strong>Change default passwords.<\/strong> This is probably one of the best methods of better securing your devices this holiday season. By simply changing a device\u2019s password to a complex one \u2014 at least eight characters in length with numbers, symbols and upper and lowercase letters \u2014 you\u2019ll adopt a significantly improved security posture.<\/p>\n<p><strong>Keep software up to date.<\/strong> Smart devices almost always require routine software updates. Often, these updates include security fixes designed to protect you from cybercriminals. Always update your devices as soon as updates become available.<\/p>\n<p><strong>Protect your core devices. <\/strong>If a hacker takes over your drone or fitness tracker, you\u2019ll want to keep them from accessing your smartphone, tablet or laptop. Security solutions like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe\u2122<\/a> can help protect your digital life from malicious software and activities.<\/p>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and Like us on\u00a0<a href=\"http:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s that time of year again: the time for a gauntlet of ads, shopping trips, and crowds as we begin&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[3949,4131],"coauthors":[3973],"class_list":["post-45981","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersafety","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing the \u2018Most Hackable&#039; Gifts of the Holiday Season | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introducing the \u2018Most Hackable&#039; Gifts of the Holiday Season | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-10T14:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:53:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Introducing the \u2018Most Hackable&#8217; Gifts of the Holiday Season\",\"datePublished\":\"2015-11-10T14:00:52+00:00\",\"dateModified\":\"2025-08-15T14:53:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"keywords\":[\"cybersafety\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\",\"name\":\"Introducing the \u2018Most Hackable' Gifts of the Holiday Season | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"datePublished\":\"2015-11-10T14:00:52+00:00\",\"dateModified\":\"2025-08-15T14:53:29+00:00\",\"description\":\"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"width\":2048,\"height\":1360,\"caption\":\"smart gifts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Introducing the \u2018Most Hackable&#8217; Gifts of the Holiday Season\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing the \u2018Most Hackable' Gifts of the Holiday Season | McAfee Blog","description":"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Introducing the \u2018Most Hackable' Gifts of the Holiday Season | McAfee Blog","og_description":"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-11-10T14:00:52+00:00","article_modified_time":"2025-08-15T14:53:29+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Introducing the \u2018Most Hackable&#8217; Gifts of the Holiday Season","datePublished":"2015-11-10T14:00:52+00:00","dateModified":"2025-08-15T14:53:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","keywords":["cybersafety","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/","name":"Introducing the \u2018Most Hackable' Gifts of the Holiday Season | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","datePublished":"2015-11-10T14:00:52+00:00","dateModified":"2025-08-15T14:53:29+00:00","description":"Let\u2019s take a look at this year\u2019s most hackable holiday gifts, and how you can easily make them more secure.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","width":2048,"height":1360,"caption":"smart gifts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-holiday-gifts-2015\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Introducing the \u2018Most Hackable&#8217; Gifts of the Holiday Season"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=45981"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45981\/revisions"}],"predecessor-version":[{"id":213747,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45981\/revisions\/213747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93242"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=45981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=45981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=45981"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=45981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}