{"id":48252,"date":"2016-03-11T15:12:16","date_gmt":"2016-03-11T23:12:16","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48252"},"modified":"2025-08-15T07:35:59","modified_gmt":"2025-08-15T14:35:59","slug":"fingerprint-scanner-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/","title":{"rendered":"An Inkjet Printer is All You Need to Hack a Smartphone\u2019s Fingerprint Scanner"},"content":{"rendered":"<p>No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even fortune telling. But one of the greatest advantages of our distinguishable digits? They\u2019re helping us log in to our smartphones securely, via fingerprint scanners.<\/p>\n<p>Now for the twist: turns out it\u2019s surprisingly easy to make copies of fingerprints. That means <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2500503,00.asp\" target=\"_blank\" rel=\"noopener\">new opportunities for hackers to break into smartphones<\/a> that rely on this form of authentication.<\/p>\n<p><a href=\"http:\/\/www.theguardian.com\/technology\/2016\/mar\/08\/samsung-and-huawei-fingerprint-scanners-can-be-fooled-using-an-inkjet-printer\" target=\"_blank\" rel=\"noopener\">Several phones were recently unlocked<\/a> through their fingerprint scanners, when security researchers printed fingerprints on inkjet printers. Although this technique first surfaced in an <a href=\"http:\/\/www.cse.msu.edu\/rgroups\/biometrics\/Publications\/Fingerprint\/CaoJain_HackingMobilePhonesUsing2DPrintedFingerprint_MSU-CSE-16-2.pdf\" target=\"_blank\" rel=\"noopener\">academic paper<\/a>, it has since even been featured in a demonstrative <a href=\"http:\/\/gizmodo.com\/how-to-easily-hack-a-smartphone-with-an-inkjet-printer-1763261331\" target=\"_blank\" rel=\"noopener\">How to Hack a smart phone <\/a>.<\/p>\n<p>To pull this off, a perpetrator only needs two tools. They need to purchase 1) any ordinary inkjet printer and 2) electricity-conducting specialty ink. Both are easily available on the Web at a cheap price. The smartphone owner\u2019s fingerprints would also need to be captured on an image file, then printed with these tools, in order to work. So the real challenge for cybercriminals would be stealing the fingerprint in the first place.<\/p>\n<p>It may sound far-fetched, but stealing fingerprints isn\u2019t an impossible feat. In 2014, hackers used photographs of the German Defense Minister to <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/dec\/30\/hacker-fakes-german-ministers-fingerprints-using-photos-of-her-hands\" target=\"_blank\" rel=\"noopener\">reproduce hers<\/a>. It\u2019s also key to remember that this day in age, our medical and personal data is more vulnerable than ever. Stories appear every day about hacks on hospitals, universities, and businesses hosting the sort of data we use to log in to our devices. In one such act, when the Office of Personnel Management was breached last year, the <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2016\/03\/fake-fingerprints-from-an-inkjet-printer-can-fool-your-smartphone\/472638\/\" target=\"_blank\" rel=\"noopener\">fingerprints of 5.6 million government employees<\/a> were stolen.<\/p>\n<p>Just think about it: we all have fingerprints stored in some database, somewhere. In addition, many of us have photos of our hands on the Web\u2014which are likely available to the public.<\/p>\n<p>We are entering an era where biometric data is becoming a <a href=\"http:\/\/thenextweb.com\/insider\/2016\/03\/09\/problem-biometrics-replacing-passwords-never-know-trust\/\" target=\"_blank\" rel=\"noopener\">substitute for passwords<\/a>. True, these features are unique for each person. But they may also be available for others to copy. Biometric security concerns are currently a highly debated topic among legal institutions and businesses. But what about the effects on users themselves? For us, the truth is, copying fingerprints isn\u2019t the first instance of biometric hacking, and it won\u2019t be the last.<\/p>\n<p>In all of history, no other human has had your fingerprints. They\u2019re completely unique to you, making them a serious factor in your personal identification. But fingerprint scanners alone are no longer enough to log in to devices securely.<\/p>\n<h2>Tips to Stay on Top of Secure Authentication<\/h2>\n<p>So, as passwords are on their way out, what can you do to stay on top of secure authentication?<\/p>\n<ul>\n<li><strong>Enable <\/strong><a href=\"https:\/\/service.mcafee.com\/webcenter\/portal\/cp\/home\/articleview;jsessionid=PrtxliSLy14ZCNQCBhHdmdmDcLGZhFk72i6iFYaR1Ph4ruZNKNlz!1843843069!-930056727?locale=en-US&amp;articleId=TS102352&amp;_afrLoop=1199919373253040#!%40%40%3F_afrLoop%3D1199919373253040%26articleId%3DTS102352%26centerWidth%3D100%2525%26leftWidth%3D0%2525%26locale%3Den-US%26rightWidth%3D0%2525%26showFooter%3Dfalse%26showHeader%3Dfalse%26_adf.ctrl-state%3D1d9ntn8kks_4\" target=\"_blank\" rel=\"noopener\"><strong>multi-factor authentication<\/strong><\/a><strong>.<\/strong> Many security protocols let you customize settings. Instead of relying solely on fingerprints to access your phone, you can require additional steps such as facial recognition or a PIN. Sure, this may not be as convenient, but it is a small price to pay for making a cybercriminal\u2019s job much more difficult.<\/li>\n<\/ul>\n<ul>\n<li><strong>Know where your phone is.<\/strong> Perpetrators are always looking for access to a device. Even if your biometric information is captured, they\u2019ll need your phone to do the deed. Don\u2019t leave your phone alone, and know its whereabouts at all times.<\/li>\n<\/ul>\n<ul>\n<li><strong>Turn to a secure log in solution.<\/strong> Not all fingerprint scanners, or any biometric authentication methods for that matter, are equal. Look into new solutions, like McAfee True Key, the easier, safer way to unlock your digital world. True Key\u2019s new <a href=\"https:\/\/blog.truekey.com\/forgot-your-master-password-we-can-help-with-that\/\" target=\"_blank\" rel=\"noopener\">Master Password Reset<\/a> feature is also helping users take more control of how they log in. You can visit TrueKey.com to learn more.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@Mcafee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":197377,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13,1838],"tags":[214],"coauthors":[3973],"class_list":["post-48252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","category-mobile-security","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fingerprint Scanner Hack Uses Inkjet Printer\u00a0<\/title>\n<meta name=\"description\" content=\"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fingerprint Scanner Hack Uses Inkjet Printer\u00a0\" \/>\n<meta property=\"og:description\" content=\"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-11T23:12:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:35:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"An Inkjet Printer is All You Need to Hack a Smartphone\u2019s Fingerprint Scanner\",\"datePublished\":\"2016-03-11T23:12:16+00:00\",\"dateModified\":\"2025-08-15T14:35:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png\",\"keywords\":[\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\",\"name\":\"Fingerprint Scanner Hack Uses Inkjet Printer\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png\",\"datePublished\":\"2016-03-11T23:12:16+00:00\",\"dateModified\":\"2025-08-15T14:35:59+00:00\",\"description\":\"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png\",\"width\":1000,\"height\":563,\"caption\":\"woman looking at her phone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Inkjet Printer is All You Need to Hack a Smartphone\u2019s Fingerprint Scanner\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fingerprint Scanner Hack Uses Inkjet Printer\u00a0","description":"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Fingerprint Scanner Hack Uses Inkjet Printer\u00a0","og_description":"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-11T23:12:16+00:00","article_modified_time":"2025-08-15T14:35:59+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"An Inkjet Printer is All You Need to Hack a Smartphone\u2019s Fingerprint Scanner","datePublished":"2016-03-11T23:12:16+00:00","dateModified":"2025-08-15T14:35:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png","keywords":["mobile security"],"articleSection":["Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/","name":"Fingerprint Scanner Hack Uses Inkjet Printer\u00a0","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png","datePublished":"2016-03-11T23:12:16+00:00","dateModified":"2025-08-15T14:35:59+00:00","description":"No two fingerprints are alike. It\u2019s an undisputable fact that\u2019s allowed humanity to make huge strides in criminal justice, record-keeping, and even","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/05\/1000x563_Blog_071924.png","width":1000,"height":563,"caption":"woman looking at her phone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/fingerprint-scanner-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"An Inkjet Printer is All You Need to Hack a Smartphone\u2019s Fingerprint Scanner"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48252"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48252\/revisions"}],"predecessor-version":[{"id":219903,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48252\/revisions\/219903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/197377"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48252"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}