{"id":49239,"date":"2016-04-26T10:31:05","date_gmt":"2016-04-26T17:31:05","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=49239"},"modified":"2025-08-31T22:30:26","modified_gmt":"2025-09-01T05:30:26","slug":"ss7-flaw-how-hackers-abuse-it","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/","title":{"rendered":"The SS7 Flaw: What it is, and How Hackers Abuse It"},"content":{"rendered":"<p>Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to remember, you still have to be on guard for malicious application and programs. Now you can add the security of <a href=\"http:\/\/www.computerworld.com\/article\/3058020\/security\/hackers-only-need-your-phone-number-to-eavesdrop-on-calls-read-texts-track-you.html\" target=\"_blank\" rel=\"noopener noreferrer\">obscure, but critical, technologies<\/a> to that list.<\/p>\n<p><em>60 Minutes <\/em>recently published a segment on the security worries around an obscure, but important, backend technology for mobile networks. The technology in question is called <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/apr\/19\/ss7-hack-explained-mobile-phone-vulnerability-snooping-texts-calls\" target=\"_blank\" rel=\"noopener noreferrer\">Signaling System Seven<\/a>, or SS7. It\u2019s a critical part of the overall security posture for mobile phone. Let me put it this way: if mobile security were a Jenga tower, then SS7 would be the one peg the entire tower balances on.<\/p>\n<p>In this case, the peg is a global network connecting carriers with phone users. SS7 is a critical piece of the mobile puzzle, allowing phone networks to exchange data, phone calls, messages and more. It\u2019s also the technology that allows travelers to roam on other networks while traveling abroad, and helps banks to confirm mobile payments via geolocation. For today\u2019s mobile world, it\u2019s a critical, but quiet, part of our daily lives.<\/p>\n<p>The problem, however, is that anyone with their hands on someone\u2019s phone number (and a lot of know-how) can use SS7 to intercept calls and record messages with relatively little work. What\u2019s more, it\u2019s very difficult to stop an SS7 attack; it can happen <strong>even if you follow security best practices<\/strong>.<\/p>\n<p>It\u2019s unsettling, but it\u2019s not all bad news. For one, you likely don\u2019t have to worry about someone surveilling you with SS7. That\u2019s largely because SS7\u2019s potential security dangers have been known since 2014 and also because such a powerful technique would probably be utilized to spy on individuals in positions of power. For another, we\u2019re talking openly about SS7 vulnerabilities, which means industry associations, companies and networks want to see the vulnerabilities fixed.<\/p>\n<p>Over the coming years, SS7 will be patched, if not outright replaced (as <a href=\"http:\/\/arstechnica.com\/security\/2016\/04\/how-hackers-eavesdropped-on-a-us-congressman-using-only-his-phone-number\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica reports<\/a>), for your protection. You can expect the same sort of treatment for many of the outdated, or insecure, industrial technologies we use day to day.<\/p>\n<h2>Mobile Security Best Practices<\/h2>\n<p>So, what can you do in the meantime? Well, there\u2019s little you or I could do to defend against SS7 attacks at this time, but it still pays to stick to mobile security best practices. So keep these tips in mind as you use your mobile devices:<\/p>\n<ul>\n<li><strong>Watch what you download.<\/strong> Applications make mobile phones what they are: our go-to resource for pretty much everything. Which is why you need to keep an eye out for malicious mobile apps. Always check the developer behind a mobile application before you purchase it. There are a lot of imitation applications that could be after more than your screen time.<\/li>\n<\/ul>\n<ul>\n<li><strong>Don\u2019t jailbreak your phone.<\/strong> Jailbreaking \u2014 the process of gaining access to the underlying system on your phone \u2014 is dangerous by nature. While it may be tempting to control every aspect of your device, you\u2019re still tempting fate by using unlicensed app stores and potentially malicious developers.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security. <\/strong>A comprehensive security solution, like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a>, can help you to secure all of your devices. Not only do such solutions scan for malicious activity, but they can help track and protect your data if it gets lost.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions&#8230;<\/p>\n","protected":false},"author":674,"featured_media":157253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[214],"coauthors":[3973],"class_list":["post-49239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T17:31:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:30:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The SS7 Flaw: What it is, and How Hackers Abuse It\",\"datePublished\":\"2016-04-26T17:31:05+00:00\",\"dateModified\":\"2025-09-01T05:30:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"keywords\":[\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\",\"name\":\"The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"datePublished\":\"2016-04-26T17:31:05+00:00\",\"dateModified\":\"2025-09-01T05:30:26+00:00\",\"description\":\"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"width\":614,\"height\":300,\"caption\":\"typing codes to stop hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The SS7 Flaw: What it is, and How Hackers Abuse It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog","description":"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog","og_description":"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-04-26T17:31:05+00:00","article_modified_time":"2025-09-01T05:30:26+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The SS7 Flaw: What it is, and How Hackers Abuse It","datePublished":"2016-04-26T17:31:05+00:00","dateModified":"2025-09-01T05:30:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/"},"wordCount":580,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","keywords":["mobile security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/","name":"The SS7 Flaw: What it is, and How Hackers Abuse It | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","datePublished":"2016-04-26T17:31:05+00:00","dateModified":"2025-09-01T05:30:26+00:00","description":"Users don\u2019t always have it easy when it comes to online security. Beyond the plethora of passwords, usernames, security questions and websites to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","width":614,"height":300,"caption":"typing codes to stop hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/ss7-flaw-how-hackers-abuse-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The SS7 Flaw: What it is, and How Hackers Abuse It"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=49239"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49239\/revisions"}],"predecessor-version":[{"id":221899,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/49239\/revisions\/221899"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/157253"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=49239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=49239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=49239"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=49239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}