{"id":48273,"date":"2016-03-11T18:06:29","date_gmt":"2016-03-12T02:06:29","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48273"},"modified":"2025-08-27T01:32:37","modified_gmt":"2025-08-27T08:32:37","slug":"why-should-i-care-about-this-dam-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/","title":{"rendered":"Why Should I Care About This Dam Hack?"},"content":{"rendered":"<p><em>This blog post was written by Bruce Snell.<\/em><\/p>\n<p>You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the <a href=\"http:\/\/www.cbsnews.com\/news\/feds-find-iran-was-behind-hack-into-us-dam-ap\/\">2013 cyber-attack<\/a> against a dam in Rye Brook, New York on Iran.\u00a0 For people living in the immediate area it caused a lot of concern, maybe causing a run on sand bags, inflatable boats and flood insurance.\u00a0 For the information security crowd, it caused a bit more concern over attacks on our nation\u2019s critical infrastructure.\u00a0 These are legitimate concerns, but for most people who use their computer for email, filling out their March Madness brackets or checking Facebook, it might not be something that causes that much concern.\u00a0 You may be asking yourself, \u201cwhy do I care about this dam attack?\u201d.<\/p>\n<p>&nbsp;<\/p>\n<p>In movies and TV shows, we often hear things like \u201cwe\u2019ve traced the attacker to the third floor of an apartment building in Prague\u201d and then the camera cuts to a scene of someone with a hooded sweatshirt furiously typing away in front of a bank of monitors as they code the attack in real time.\u00a0 Real cybercriminals don\u2019t operate this way.\u00a0 Part of why it takes so long to really figure out who is behind an attack (usually referred to as \u201cattribution\u201d) is because any hacker that\u2019s worth his\/her salt will take many steps to hide their point of origin.\u00a0 A common way to do this is to first hack another system and then launch a new attack from this now compromised system.\u00a0 This is typically called \u201cpivoting\u201d.<br \/>\nAn attacker could actually do a series of pivots, making it even harder to track the attack back to its point of origin.<img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-48280 \" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/pivot-1.jpg\" alt=\"\" width=\"780\" height=\"517\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1.jpg 1086w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1-300x199.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1-768x509.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1-1024x679.jpg 1024w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<p>So where does the attacker find these systems to use as pivot points?\u00a0 While some cybercriminals might look for unprotected webservers they could take over, there is actually a much easier source for spare computing power to launch their nefarious schemes: your computer.\u00a0 Ok, not your computer, but others like it.\u00a0 One popular tactic for cybercriminals is to install software on an infected system that turns it into part of a connected network of systems known as a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Botnet\">botnet<\/a>. \u00a0\u00a0Once a system is part of a botnet, it can be used not only to collect all sorts of information about the person using the infected system (what sites they visit, logins and passwords, even webcam captures), but these systems can now be used to send out spam, spread the infection to other nearby systems, or even launch attacks.\u00a0 There is even an underground economy around botnets where cybercriminals can rent time on a botnet to carry out their own cybercrime operations.\u00a0 Operations like launching attacks at critical infrastructure.<\/p>\n<h2>How to Protect Yourself<\/h2>\n<p>When we go back to the original question of \u201cwhy should I care about this dam attack?\u201d, it starts to become clear that keeping our computers free of malware can actually weaken the tools of the cybercriminals who want to launch attacks against banks, hospitals and critical infrastructure.<\/p>\n<p>So how do we, as the average Joe, make it harder for the bad guys?<\/p>\n<ol>\n<li>Remain vigilant: Spam and phishing continue to be a top tool for cybercriminals, so take extra care to not click on a suspicious link or attachment.\u00a0 What makes it suspicious?\u00a0 Maybe it\u2019s an oddly\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/spot-phishy-email\/\">worded email<\/a>\u00a0pretending to be your bank asking for more information.\u00a0 It could be an unexpected attachment from someone in your contact list.\u00a0 If you weren\u2019t expecting someone to send you an attachment, call or text them to double check.\u00a0 Cybercriminals will try every trick in the book to get you to click on a bad link so they can infect your device.<\/li>\n<li>Stay up to date: I don\u2019t mean staying up to date on the news and weather (although that\u2019s also important), I mean keep your system up to date with the latest security patches and updates.\u00a0 At McAfee Labs, we see plenty of older malware still running around and infecting systems years after a patch has been released that stops the exploit.\u00a0 Turn on automatic updates for your device to make keeping up to date easier.<\/li>\n<li>Use security software: Keeping your system up to date will help you stay safe from older viruses, but you should also install anti-virus on your system to protect against new threats or older threats that haven\u2019t yet been fixed by OS or application updates.\u00a0 Our McAfee Labs team currently sees an average of 5 new threats every second and there is no indication that the bad guys are slowing down.\u00a0 Installing anti-virus is a simple step you can take to help your system from become a tool for cybercriminals.<\/li>\n<\/ol>\n<p>Attacks against critical infrastructure like dams, electrical grids and gas pipelines are only going to continue in frequency as we move to a more connected world.\u00a0 Manufactures and the security teams who watch these assets are doing their best to keep the attackers at bay, but those of us at home can do our part by keeping our desktops, laptops, tablets and smartphones free of malware that could be used as a tool by cybercriminals.\u00a0 It doesn\u2019t require a degree in IT or a huge amount of time to stay safe, just mix the three tips above with some common sense and you\u2019re on the right track.<\/p>\n<p>Stay safe!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially&#8230;<\/p>\n","protected":false},"author":674,"featured_media":77324,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"tags":[],"coauthors":[3973],"class_list":["post-48273","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-family-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Should I Care About This Dam Hack? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Should I Care About This Dam Hack? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-12T02:06:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T08:32:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1086\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Why Should I Care About This Dam Hack?\",\"datePublished\":\"2016-03-12T02:06:29+00:00\",\"dateModified\":\"2025-08-27T08:32:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\"},\"wordCount\":902,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg\",\"articleSection\":[\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\",\"name\":\"Why Should I Care About This Dam Hack? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg\",\"datePublished\":\"2016-03-12T02:06:29+00:00\",\"dateModified\":\"2025-08-27T08:32:37+00:00\",\"description\":\"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg\",\"width\":5000,\"height\":3212,\"caption\":\"Equifax data breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Family Safety\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Should I Care About This Dam Hack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Should I Care About This Dam Hack? | McAfee Blog","description":"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why Should I Care About This Dam Hack? | McAfee Blog","og_description":"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013","og_url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-12T02:06:29+00:00","article_modified_time":"2025-08-27T08:32:37+00:00","og_image":[{"width":1086,"height":720,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/pivot-1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Why Should I Care About This Dam Hack?","datePublished":"2016-03-12T02:06:29+00:00","dateModified":"2025-08-27T08:32:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/"},"wordCount":902,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg","articleSection":["Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/","name":"Why Should I Care About This Dam Hack? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg","datePublished":"2016-03-12T02:06:29+00:00","dateModified":"2025-08-27T08:32:37+00:00","description":"This blog post was written by Bruce Snell. You may have heard recently about US Justice Department\u2019s plans to officially lay blame for the 2013","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/08\/Payments-System-Hacking.jpg","width":5000,"height":3212,"caption":"Equifax data breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/why-should-i-care-about-this-dam-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Family Safety","item":"https:\/\/www.mcafee.com\/blogs\/family-safety\/"},{"@type":"ListItem","position":3,"name":"Why Should I Care About This Dam Hack?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48273"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48273\/revisions"}],"predecessor-version":[{"id":221287,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48273\/revisions\/221287"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/77324"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48273"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}