{"id":47443,"date":"2016-02-08T09:10:26","date_gmt":"2016-02-08T17:10:26","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=47443"},"modified":"2025-08-15T07:42:57","modified_gmt":"2025-08-15T14:42:57","slug":"fisher-price-toy-vulnerability","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/","title":{"rendered":"Another Day, Another Smart Toy Hack: This Time, It\u2019s Fisher-Price"},"content":{"rendered":"<p>Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had porcelain dolls, today\u2019s children are exposed to a danger unique to their generation: Internet-connected toys <a href=\"http:\/\/www.infosecurity-magazine.com\/news\/two-smarttoy-flaws-give-attackers\/\" target=\"_blank\" rel=\"noopener\">that enable cybercrime<\/a>.<\/p>\n<p>Exhibit A: the <a href=\"http:\/\/www.theguardian.com\/technology\/2016\/feb\/02\/fisher-price-mattel-smart-toy-bear-data-hack-technology\" target=\"_blank\" rel=\"noopener\">Fisher-Price Smart Toy Bear<\/a>. On the surface, this teddy bear is remarkable for its ability to remember a child\u2019s name, birthday, gender and more. So, why would it need to remember these things? According to the company, the bear incorporates this information into learning activities parents download from the Internet. While customizing a learning tool is a great idea, it also means the bear is building a profile of its owner and the owner\u2019s child. This can be problematic.<\/p>\n<p>Frequent readers can probably guess what happens next: cybercriminals, looking for an easy score, targeted the toy\u2019s website in an effort to steal personal information and sell it on the black market.<\/p>\n<p>Thankfully, their plan fell through. A group of security researchers <a href=\"http:\/\/www.pcworld.com\/article\/3028763\/security\/flaws-in-smart-toy-back-end-servers-puts-kids-and-their-families-at-risk.html\" target=\"_blank\" rel=\"noopener\">discovered several security flaws<\/a> in how the smart bear communicated with Fisher-Price\u2019s platform. According to this group, the toys weren\u2019t \u201cappropriately verifying the \u2018sender\u2019 of messages.\u201d This, theoretically, would allow cybercriminals to retrieve customer profiles and children\u2019s details, monitor how often a child interacts with the toy and how often a parent uses the toy\u2019s associated mobile app.<\/p>\n<p>It turns out that cybercriminals can do quite a bit with this information. This sort of data could be useful in launching <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/spear-phishing-leaves-a-bloody-wound\" target=\"_blank\" rel=\"noopener\">spear phishing<\/a> attacks, where a victim is tricked into providing sensitive information to hackers posing as a trusted entity. Other uses for this sort of data range from cracking passwords (never use a relative\u2019s name for a password), to harassing a child or parent through a connected application, to identity theft.<\/p>\n<p>Luckily, the ideal scenario played out: cybersecurity professionals discovered a product\u2019s vulnerabilities, notified the affected company, detailed how the vulnerabilities worked, and the issue was fixed. Both Fisher-Price and the security researchers should be applauded for such a quick, smooth cybersecurity operation.<\/p>\n<p>Unfortunately, we\u2019re likely going to see more of these sorts of security vulnerabilities in the future. In early December for instance, VTech, a manufacturer specializing in Internet-connected toys, suffered a massive breach. You can expect more of these sorts of stories as the Internet of Things continues to mature.<\/p>\n<h2>Tips to Keep in Mind<\/h2>\n<p>So, what can you do right now to protect yourself, and your loved ones? Here are a few tips to keep in mind:<\/p>\n<ul>\n<li><strong>Use Internet-connected toys safely.\u00a0<\/strong>Children will always want the latest interactive toy on the shelf. These toys are increasingly featuring Internet-connectivity. It is critical to ensure these devices are\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/most-hackable-holiday-gifts-2015\/\" target=\"_blank\" rel=\"noopener\">being used safely<\/a>, by changing default passwords, and keeping software up to date.<\/li>\n<\/ul>\n<ul>\n<li><strong>Keep an eye for suspicious activity. <\/strong>If you do opt to purchase an Internet-connected toy, be sure to keep a keen eye on profiles, activities and changes. Often times, cybercriminals will change a gadget\u2019s settings and account information when given the chance. Change your password immediately \u2014 before cybercriminals lock you out of your own account \u2014 and notify the toy company if you notice strange or unauthorized changes on your devices.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use strong and unique passwords.\u00a0<\/strong>If there\u2019s one thing to harp on, it\u2019s this: use strong, unique passwords for each site you visit, and for each device you use\u2014and that includes connected toys. It sounds like a lot to manage. It doesn\u2019t have to be. Password management solutions, like\u00a0True Key\u2122 , are simplifying the way you securely log into online accounts.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had&#8230;<\/p>\n","protected":false},"author":674,"featured_media":123787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[76,4131,2205],"coauthors":[3973],"class_list":["post-47443","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybercrime","tag-internet-of-things","tag-protecting-kids-online"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Smart Toy Hack: This Time, It&#039;s Fisher-Price<\/title>\n<meta name=\"description\" content=\"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Smart Toy Hack: This Time, It&#039;s Fisher-Price\" \/>\n<meta property=\"og:description\" content=\"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-08T17:10:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:42:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Another Day, Another Smart Toy Hack: This Time, It\u2019s Fisher-Price\",\"datePublished\":\"2016-02-08T17:10:26+00:00\",\"dateModified\":\"2025-08-15T14:42:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\"},\"wordCount\":620,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg\",\"keywords\":[\"cybercrime\",\"Internet of Things\",\"protecting kids online\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\",\"name\":\"New Smart Toy Hack: This Time, It's Fisher-Price\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg\",\"datePublished\":\"2016-02-08T17:10:26+00:00\",\"dateModified\":\"2025-08-15T14:42:57+00:00\",\"description\":\"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg\",\"width\":614,\"height\":300,\"caption\":\"is roblox safe for kids?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Another Day, Another Smart Toy Hack: This Time, It\u2019s Fisher-Price\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Smart Toy Hack: This Time, It's Fisher-Price","description":"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New Smart Toy Hack: This Time, It's Fisher-Price","og_description":"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-02-08T17:10:26+00:00","article_modified_time":"2025-08-15T14:42:57+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Another Day, Another Smart Toy Hack: This Time, It\u2019s Fisher-Price","datePublished":"2016-02-08T17:10:26+00:00","dateModified":"2025-08-15T14:42:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/"},"wordCount":620,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg","keywords":["cybercrime","Internet of Things","protecting kids online"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/","name":"New Smart Toy Hack: This Time, It's Fisher-Price","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg","datePublished":"2016-02-08T17:10:26+00:00","dateModified":"2025-08-15T14:42:57+00:00","description":"Toys offer a unique insight into a time, place and culture that has come and gone. While the Romans had small wooden horses and the Victorians had","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/614x300_MFE_Blogs_070421_Blog.jpg","width":614,"height":300,"caption":"is roblox safe for kids?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/fisher-price-toy-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Another Day, Another Smart Toy Hack: This Time, It\u2019s Fisher-Price"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47443","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=47443"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47443\/revisions"}],"predecessor-version":[{"id":219908,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47443\/revisions\/219908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/123787"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=47443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=47443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=47443"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=47443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}