{"id":47827,"date":"2016-02-26T09:21:17","date_gmt":"2016-02-26T17:21:17","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=47827"},"modified":"2025-08-15T07:37:06","modified_gmt":"2025-08-15T14:37:06","slug":"mousejack-hacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/","title":{"rendered":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters"},"content":{"rendered":"<p>Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack involving hijacking a computer through its wireless mouse.<\/p>\n<p>This attack was <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/02\/23\/bastille-mousejack-attacks-hack-keystrokes\/#625dd39fae9f\" target=\"_blank\" rel=\"noopener\">recently discovered by researchers<\/a>, who found that it allowed hackers to compromise devices through wireless accessories within 100 meters. To be more specific, they were able to do so by taking control of USB dongles, which connect PCs to gadgets like mice and keyboards. These dongles listen to radio signals coming from say, a mouse, which essentially tell the computer what to do.<\/p>\n<p>The security issue? These dongles will listen and respond to any command resembling one from the original mouse\u2014allowing fake radio signals to seep through and gain control.<\/p>\n<p>And that\u2019s not the worst of it. These hackers, or mousejackers, can then <a href=\"http:\/\/www.cbsnews.com\/news\/hackers-could-mousejack-your-computer\/\" target=\"_blank\" rel=\"noopener\">trick the USB dongle<\/a> into receiving keyboard directions. Now, if you\u2019re lucky, a friend might use this hack to pull a prank and type funny phrases onto your computer from afar. Unfortunately, this sort of attack has the potential to be anything but innocent. Cybercriminals could potentially use the keyboard control capabilities to install <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\" target=\"_blank\" rel=\"noopener\">malware<\/a> onto your device, or gain access to your sensitive information.<\/p>\n<p>So many factors make mousejacking unique to other malicious activities. Many of today\u2019s cybersecurity breaches involve the hacker gaining access to private data by coaxing users into <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/phishing\" target=\"_blank\" rel=\"noopener\">clicking on a phony link<\/a>, or exploiting system backdoors. Meanwhile, when someone gets mousejacked, criminals are directly controlling their computer through a radio signal.<\/p>\n<p>The most shocking part of the hack? It\u2019s remarkably easy to pull off. It\u2019s a very low-tech process that <a href=\"http:\/\/www.wired.com\/2016\/02\/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc\/\" target=\"_blank\" rel=\"noopener\">only requires a $12 antenna<\/a> to execute. This computer antenna allows hackers to create their own radio signals\u2014even if the wireless device targeted is designed to encrypt communications with the PC it\u2019s paired with. That\u2019s scary stuff.<\/p>\n<p>In response to these discoveries, many wireless mouse and keyboard manufacturers have released statements around the hack. Many are even <a href=\"http:\/\/www.networkworld.com\/article\/3036463\/mobile-security\/countless-computers-vulnerable-to-mousejack-attack-through-wireless-mice-and-keyboards.html\" target=\"_blank\" rel=\"noopener\">working on a security update<\/a> for their products, which is great news.<\/p>\n<h2>How to Protect Yourself from Mousejacking<\/h2>\n<p>As we increasingly rely on wireless gadgets in our lives, it\u2019s important to have security top of mind. Even high-tech devices can be made vulnerable from constantly evolving hacker methods. With that in mind, here are a few tips to stay protected from mousejacking:<\/p>\n<ul>\n<li><strong>Keep wireless devices up-to-date.<\/strong> If you have a wireless accessory for your PC, keep an eye on the manufacturer\u2019s latest security patches. The best way to keep your gadgets protected, wireless or not, is to keep them updated. General software updates will often also include security fixes, so tune up your devices whenever given the chance.<\/li>\n<\/ul>\n<ul>\n<li><strong>Cut hackers off at the source.<\/strong> Mousejacking can only happen if the hacker is 1) within 100 meters of your computer, and 2) if you\u2019re using a USB dongle for device pairing. If you notice your mouse or keyboard jabbering away on its own, unplug the dongle and report the issue to the manufacturer immediately.<\/li>\n<\/ul>\n<ul>\n<li><strong>Research before you buy.<\/strong> We\u2019re likely to see another explosion of wireless and Internet-connected products in the next few years, and it\u2019s easy to get carried away by all the shiny new toys. But be sure do yourself a favor and do a bit of research before taking the plunge with a new product. Make sure it\u2019s a strong and secure fit.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year, more and more words are making it into the English dictionary. The next one to make its debut&#8230;<\/p>\n","protected":false},"author":674,"featured_media":118564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[76,4131],"coauthors":[3973],"class_list":["post-47827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybercrime","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-26T17:21:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:37:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters\",\"datePublished\":\"2016-02-26T17:21:17+00:00\",\"dateModified\":\"2025-08-15T14:37:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"keywords\":[\"cybercrime\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\",\"name\":\"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"datePublished\":\"2016-02-26T17:21:17+00:00\",\"dateModified\":\"2025-08-15T14:37:06+00:00\",\"description\":\"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"width\":1200,\"height\":675,\"caption\":\"how to run a virus scan\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog","description":"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog","og_description":"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-02-26T17:21:17+00:00","article_modified_time":"2025-08-15T14:37:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters","datePublished":"2016-02-26T17:21:17+00:00","dateModified":"2025-08-15T14:37:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/"},"wordCount":588,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","keywords":["cybercrime","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/","name":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","datePublished":"2016-02-26T17:21:17+00:00","dateModified":"2025-08-15T14:37:06+00:00","description":"Every year, more and more words are making it into the English dictionary. The next one to make its debut might be the term MouseJack: a cyberattack","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","width":1200,"height":675,"caption":"how to run a virus scan"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/mousejack-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"MouseJack Hacks Target Wireless Keyboards and Mice Within 100 Meters"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=47827"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47827\/revisions"}],"predecessor-version":[{"id":219904,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/47827\/revisions\/219904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/118564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=47827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=47827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=47827"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=47827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}