{"id":46091,"date":"2015-11-10T06:00:21","date_gmt":"2015-11-10T14:00:21","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=46091"},"modified":"2025-08-15T07:57:26","modified_gmt":"2025-08-15T14:57:26","slug":"golden-age-for-hackers","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/","title":{"rendered":"Mobile Attacks: The Golden Age for Hackers"},"content":{"rendered":"<p>It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun to reimagine those story lines with today\u2019s tech advancements. Without a doubt there would have been an episode around the dim-witted Joey having his mobile phone hacked because all of his passwords were \u20181,2,3,4.\u2019<\/p>\n<p>Today, we use mobile devices for just about everything. We use them to shop, exercise, work, play games, and even watch reruns of \u201cFriends.\u201d So, it\u2019s safe to say that were some of the hit shows of the \u201890s and early \u201800s re-written today, they\u2019d feature smartphone plot lines.<\/p>\n<p>The downside of this dependency is that it provides a personal portal for hackers, directly into users\u2019 lives.<\/p>\n<p>Our reliance on mobile devices combined with a general lack of knowledge about mobile security best practices has opened a whole new world for attacks. It\u2019s become the golden age for hackers. In order to defend ourselves against increasingly personal hacks; the need to understand mobile threats is more important now than ever.<\/p>\n<h2>Types of Malware to Look Out For<\/h2>\n<p>To help you defend your mobile phone from hackers, we\u2019ve pulled together a quick guide on the most common types of malware you should look out for:<\/p>\n<ul>\n<li><strong><u>Malicious weblinks:<\/u><\/strong> These links aim to entice users with special offers on the site. Adult material sites are where most hackers target mobile phone users; in fact, 36% of all mobile traffic to malicious links originated from those types of sites!<\/li>\n<\/ul>\n<ul>\n<li><strong><u>WebAds:<\/u><\/strong> Hackers use malvertising to inject malicious advertisements into legitimate online ads and webpages. When a visitor clicks on an ad that might look legitimate, it turns out to be malware, and boom, their personal data is at risk.<\/li>\n<\/ul>\n<ul>\n<li><strong><u>Ransomware:<\/u><\/strong> This is perhaps the most devious and personal type of mobile malware tactic. Through these highly targeted attacks, hackers can hijack photos, videos, and other personal information until a fee is paid to the cyber criminal.<\/li>\n<\/ul>\n<ul>\n<li><strong><u>Potentially unwanted software:<\/u><\/strong> Junk mobile apps find their way onto devices through deceptive advertising and then install unwanted programs.<\/li>\n<\/ul>\n<ul>\n<li><strong><u>Information leakage:<\/u><\/strong> Most mobile app users are unaware that certain apps are leaking out their personal information straight to cyber criminals.<\/li>\n<\/ul>\n<p>Mobile threats are growing and they\u2019re real, but luckily there are several things you can do to protect your mobile phone from an attack.<\/p>\n<ul>\n<li><strong><u>Safe searches:<\/u><\/strong>\n<ul>\n<li>&#8211; When searching for sites on your mobile phone, check the web address for misspellings<\/li>\n<li>&#8211; Be suspicious of advertisements and offers that seem too good to be true.<\/li>\n<li>&#8211; Be cautious of searching <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/most-dangerous-celebrities-2015\/\" target=\"_blank\" rel=\"noopener\">hot topics<\/a>. Cybercriminals use them to lure users into clicking on fake and malicious sites.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong><u>Know your apps: <\/u><\/strong>\n<ul>\n<li>&#8211; Only download apps from well-known reputable app stores.<\/li>\n<li>&#8211; Read app reviews before you download them.<\/li>\n<li>&#8211; Avoid blindly agreeing to permissions.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong><u>Install security on your device: <\/u><\/strong>\n<ul>\n<li>&#8211;\u00a0<a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener\">McAfee\u00ae Mobile Security<\/a> is free for\u00a0<a href=\"http:\/\/app.appsflyer.com\/com.wsandroid.suite?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener\">Android<\/a>\u00a0and can help protect your device from malware.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>As always, to keep up with the latest security threats, make sure to follow <a href=\"https:\/\/twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a> on Twitter and like us on <a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-30889\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/lianne-caetano.jpg\" alt=\"lianne-caetano\" width=\"150\" height=\"99\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology&#8230;<\/p>\n","protected":false},"author":674,"featured_media":157253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13,1838],"tags":[180,4238,4549],"coauthors":[3973],"class_list":["post-46091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","category-mobile-security","tag-malware","tag-mcafee-mobile-security","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Attacks: The Golden Age for Hackers | McAfee Blog<\/title>\n<meta name=\"description\" content=\"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Attacks: The Golden Age for Hackers | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-10T14:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/lianne-caetano.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"99\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Mobile Attacks: The Golden Age for Hackers\",\"datePublished\":\"2015-11-10T14:00:21+00:00\",\"dateModified\":\"2025-08-15T14:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"keywords\":[\"malware\",\"McAfee Mobile Security\",\"ransomware\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\",\"name\":\"Mobile Attacks: The Golden Age for Hackers | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"datePublished\":\"2015-11-10T14:00:21+00:00\",\"dateModified\":\"2025-08-15T14:57:26+00:00\",\"description\":\"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"width\":614,\"height\":300,\"caption\":\"typing codes to stop hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile Attacks: The Golden Age for Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Attacks: The Golden Age for Hackers | McAfee Blog","description":"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Mobile Attacks: The Golden Age for Hackers | McAfee Blog","og_description":"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-11-10T14:00:21+00:00","article_modified_time":"2025-08-15T14:57:26+00:00","og_image":[{"width":150,"height":99,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/lianne-caetano.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Mobile Attacks: The Golden Age for Hackers","datePublished":"2015-11-10T14:00:21+00:00","dateModified":"2025-08-15T14:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/"},"wordCount":528,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","keywords":["malware","McAfee Mobile Security","ransomware"],"articleSection":["Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/","name":"Mobile Attacks: The Golden Age for Hackers | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","datePublished":"2015-11-10T14:00:21+00:00","dateModified":"2025-08-15T14:57:26+00:00","description":"It\u2019s fun to re-watch shows like \u201cFriends\u201d and realize that so many plot lines are irrelevant today because of technology advancements. It\u2019s even more fun","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","width":614,"height":300,"caption":"typing codes to stop hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/golden-age-for-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Mobile Attacks: The Golden Age for Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=46091"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46091\/revisions"}],"predecessor-version":[{"id":219913,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/46091\/revisions\/219913"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/157253"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=46091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=46091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=46091"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=46091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}