{"id":48406,"date":"2016-03-15T11:50:33","date_gmt":"2016-03-15T18:50:33","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48406"},"modified":"2025-08-15T07:34:19","modified_gmt":"2025-08-15T14:34:19","slug":"keyless-entry-car-hacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/","title":{"rendered":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car"},"content":{"rendered":"<p>There\u2019s a certain sort of absurd-ism to <em>Christine<\/em>, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car hunts down and kills any person threatening its existence. It\u2019s an autonomous 1958 Plymouth Fury with a taste for blood \u2014 and nothing will stop it. But, thankfully, <em>Christine<\/em> is a fantasy. For our reality-bound mechanical nightmares, we\u2019re stuck with something far more common: keyless entry hacks.<\/p>\n<p>Now more than ever, cybercriminals are using the technology embedded in today\u2019s connected cars to enable illicit activities. For example, cybercriminals can overwhelm proximity keyless entry systems to steal goods. Using the same sort of method, cybercriminals can also easily steal cars with keyless ignition systems. These systems, often working with a\u00a0car remote or fob, are increasingly becoming commonplace, as these features trickle down to differing demographics and enter used car markets.<\/p>\n<p>In fact, according to Kelly Blue Book, <a href=\"http:\/\/fortune.com\/2016\/03\/02\/public-car-hacking\/\" target=\"_blank\" rel=\"noopener\">62 percent of respondents<\/a> worry that future cars will be easily hacked. Unfortunately, it appears as though that day may be closer than we realize.<\/p>\n<p>Take, for example, <a href=\"http:\/\/www.cnbc.com\/2016\/03\/08\/hacking-a-connected-car-is-this-easy.html\" target=\"_blank\" rel=\"noopener\">CNBC\u2019s story on Yash<\/a>. Yash is a San Francisco tech worker who bought a car with a keyless entry system. A savvy thief used this system to gain access to Yash\u2019s car, and his belongings, without causing any noticeable damage to the vehicle.<\/p>\n<p>So, how did the hack work? Well, it could have gone one of two ways.<\/p>\n<p>The first scenario would be that Yash\u2019s car was the victim of an amplification attack, in which a crook amplifies the signal of a keyless remote using a power amplifier purchased on the cheap. The second scenario would involve the criminal planting a device nearby to intercept the door entry code. These are pretty much the same methods behind all the hacks on baby monitors and webcams we\u2019ve been hearing so much about.<\/p>\n<p>Internet-connected cars can offer us another example. In the summer of 2015, WIRED journalist Andy Greenberg drove <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/jeep-hacking-successful\/\" target=\"_blank\" rel=\"noopener\">an Internet-connected Jeep<\/a> outside of St. Louis, Missouri on a busy highway. Greenberg was writing a story on<a href=\"http:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\" target=\"_blank\" rel=\"noopener\"> wireless carjacking<\/a> in association with two professional security researchers. During his drive, the researchers managed to remotely fiddle with Greenberg\u2019s air conditioning, radio, wiper blades, windshield wiper fluid and, eventually, cut off the vehicle\u2019s transmission while on a busy highway.<\/p>\n<p>Fortunately, no one was hurt during that story\u2019s making. But it did serve to highlight a very important point about our methodology when it comes to the Internet and cars: we\u2019re building cars to go from Point A to Point B with comfort and luxury in mind \u2014 even if that means they are insecure against cybercriminals. That\u2019s something <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/securing-the-cars-of-the-future\/\" target=\"_blank\" rel=\"noopener\">we need to fix<\/a>.<\/p>\n<h2>Tips to Keep in Mind<\/h2>\n<p>So, what can you do to protect your vehicle and valuables from the foils of\u00a0tech-savvy car thieves? Here are a few tips to keep in mind:<\/p>\n<ul>\n<li><strong>Do your homework. <\/strong>When preparing to purchase a new, smart vehicle, do some research on the auto manufacturer. The reputation of the company, and its car models&#8217; potential history of exploits, will help guide you in making a decision with security in mind.<\/li>\n<\/ul>\n<ul>\n<li><strong>Update your car\u2019s software.<\/strong> Every device has software \u2014 even your car. Keep your driving experience a smooth one, and update your car whenever new software becomes available. Keep in mind that some manufacturers will issue updates wirelessly, while others may require you to head into a dealer to install.<\/li>\n<\/ul>\n<ul>\n<li><strong>Stay informed.<\/strong> Cyberattacks on cars are an uncommon occurrence. When they do happen, they make headlines. If you hear of a vulnerability in the news, check with your car manufacturer about any security updates or recalls.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In&#8230;<\/p>\n","protected":false},"author":674,"featured_media":67887,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[76,4452,4131],"coauthors":[3973],"class_list":["post-48406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybercrime","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog<\/title>\n<meta name=\"description\" content=\"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-15T18:50:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T14:34:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How Keyless Entry Lets Cybercriminals Hack Your Connected Car\",\"datePublished\":\"2016-03-15T18:50:33+00:00\",\"dateModified\":\"2025-08-15T14:34:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\"},\"wordCount\":626,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png\",\"keywords\":[\"cybercrime\",\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\",\"name\":\"How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png\",\"datePublished\":\"2016-03-15T18:50:33+00:00\",\"dateModified\":\"2025-08-15T14:34:19+00:00\",\"description\":\"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png\",\"width\":650,\"height\":419,\"caption\":\"electric car driving\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Keyless Entry Lets Cybercriminals Hack Your Connected Car\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog","description":"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog","og_description":"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-15T18:50:33+00:00","article_modified_time":"2025-08-15T14:34:19+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car","datePublished":"2016-03-15T18:50:33+00:00","dateModified":"2025-08-15T14:34:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/"},"wordCount":626,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png","keywords":["cybercrime","cybersecurity","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/","name":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png","datePublished":"2016-03-15T18:50:33+00:00","dateModified":"2025-08-15T14:34:19+00:00","description":"There\u2019s a certain sort of absurd-ism to Christine, the novel-slash-movie released by Stephen King and John Carpenter in 1983. In both renditions, a car","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/driving_electric_car650.png","width":650,"height":419,"caption":"electric car driving"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keyless-entry-car-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How Keyless Entry Lets Cybercriminals Hack Your Connected Car"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48406"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48406\/revisions"}],"predecessor-version":[{"id":219902,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48406\/revisions\/219902"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/67887"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48406"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}