{"id":50140,"date":"2016-05-31T16:11:02","date_gmt":"2016-05-31T23:11:02","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50140"},"modified":"2025-08-27T01:14:01","modified_gmt":"2025-08-27T08:14:01","slug":"keysweeper-keylogger-threat","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/","title":{"rendered":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes"},"content":{"rendered":"<p>If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common and crafty, Bond gadgets always capture the audience\u2019s imagination. In fact, some Bond gadgets were so powerful in concept that <a href=\"http:\/\/gizmodo.com\/5966242\/10-james-bond-gadgets-that-actually-existand-one-that-needs-to\" target=\"_blank\" rel=\"noopener\">they became real<\/a>, everyday objects. Fingerprint readers and cameras are embedded into our phones, we can lock and unlock remote-controlled doors, and leveraging GPS location technology is daily occurrence. They\u2019re all common, and have become everyday technologies.<\/p>\n<p>This is why <a href=\"http:\/\/arstechnica.com\/security\/2016\/05\/beware-of-keystroke-loggers-disguised-as-usb-phone-chargers-fbi-warns\/\" target=\"_blank\" rel=\"noopener\">KeySweeper is so unsettling<\/a>. KeySweeper is a $10 <a href=\"http:\/\/searchcio.techtarget.com\/definition\/proof-of-concept-POC\" target=\"_blank\" rel=\"noopener\">proof-of-concept<\/a> spying tool that\u2019s simple, clever and very Bondish; it\u2019s a <a href=\"https:\/\/www.mcafee.com\/learn\/what-is-a-keylogger\/#:~:text=A%20keylogger%2C%20short%20for%20keystroke,their%20actions%20are%20being%20monitored.\" target=\"_blank\" rel=\"noopener\">keylogging device<\/a> disguised as a USB charger (the kind of charger you plug into an outlet to charge your phone). The device intercepts and decrypts signals sent from wireless keyboards, allowing it to record usernames, passwords and a bevy of personal data over a cellular connection.<\/p>\n<p>So, whether you\u2019re using a wireless keyboard in your office, or a hotel room, watch out: all a cybercriminal has to do is plug the tool into a strategic AC outlet and wait.<\/p>\n<p>Like I said, it\u2019s a very Bond-esque device, which is why the <a href=\"https:\/\/www.hackread.com\/usb-charger-keystroke-logger-fbi\/\" target=\"_blank\" rel=\"noopener\">FBI is so concerned<\/a>. In late April, FBI officials issued a <a href=\"https:\/\/www.americanbar.org\/content\/dam\/aba\/administrative\/cyberalert\/keysweeper.authcheckdam.pdf\" target=\"_blank\" rel=\"noopener\">private industry notification<\/a> about the threat to businesses. The notification broke down what KeySweeper is, what KeySweeper objects could look like and how organizations can avoid falling into this particular keylogger trap.<\/p>\n<p>Thankfully, KeySweeper has a few limitations working against it. First, it has to be near its target in order to pick up on the wireless keyboard\u2019s signals. Second, it\u2019s limited to wireless keyboards made before 2011 (some encryption standards have changed since then). Finally, it needs to be powered to work \u2014\u00a0meaning that unplugging strange devices and unknown chargers could kill the attack.<\/p>\n<p>That last limitation, however, can be easily overcome. KeySweeper devices can be augmented with a small battery that allows it to run even when it\u2019s unplugged, which means it could steal signals for hours without a power source.<\/p>\n<p>So, if you happen to notice a device like the below plugged into an outlet near you, and you\u2019re using a wireless keyboard, take heed\u2014it could be a KeySweeper attack in the works. Now, the KeySweeper program can take many forms, in addition to the below wall plug-in example. That said, it\u2019s best to be suspicious of any unfamiliar devices around you when you\u2019re typing wirelessly.<\/p>\n<p style=\"text-align: center;\"><em><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-50141 \" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/keysweeper1.jpg\" alt=\"keysweeper1\" width=\"288\" height=\"144\" \/>Samy Kamkar \/ samy.pl\/keysweeper<\/em><\/p>\n<h2>Tips to Avoid Keylogging<\/h2>\n<p>KeySweeper could soon be the first example of a long running battle with keylogger attacks. To protect yourself from KeySweeper and other keyloggers, follow these tips:<\/p>\n<ul>\n<li><strong>Stick to wired, or built in, keyboards<\/strong>. The whole premise of KeySweeper is to steal signals from wireless keyboards. To avoid falling victim, stick to wired or built-in keyboards. For those of us who <em>must <\/em>have a wireless one, make sure it\u2019s using strong encryption (<a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Advanced-Encryption-Standard\" target=\"_blank\" rel=\"noopener\">look for AES<\/a>).<\/li>\n<\/ul>\n<ul>\n<li><strong>Know your chargers. <\/strong>USB chargers are a currency unto themselves these days, but that doesn\u2019t mean you have to pay the price when using one. Make sure you know where your USB charger comes from before you use it, and don\u2019t leave unknown or untrusted gadgets plugged into your devices\u2014unplug them or remove them entirely.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security<\/strong>. Like a lot of malicious software today, keyloggers are pretty well-known and easily blocked by security software like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe\u2122<\/a>. Keep all of your devices safe and sound with a comprehensive security solution.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a> and<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\"> @McAfee_Home<\/a>\u00a0on Twitter, and &#8216;Like&#8217; us on <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From&#8230;<\/p>\n","protected":false},"author":674,"featured_media":118564,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,12],"tags":[4109,142],"coauthors":[3973],"class_list":["post-50140","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-family-safety","tag-cyber-espionage","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog<\/title>\n<meta name=\"description\" content=\"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-31T23:11:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T08:14:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/keysweeper1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"252\" \/>\n\t<meta property=\"og:image:height\" content=\"126\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes\",\"datePublished\":\"2016-05-31T23:11:02+00:00\",\"dateModified\":\"2025-08-27T08:14:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\"},\"wordCount\":631,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"keywords\":[\"cyber espionage\",\"identity theft\"],\"articleSection\":[\"Internet Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\",\"name\":\"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"datePublished\":\"2016-05-31T23:11:02+00:00\",\"dateModified\":\"2025-08-27T08:14:01+00:00\",\"description\":\"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png\",\"width\":1200,\"height\":675,\"caption\":\"how to run a virus scan\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog","description":"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog","og_description":"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-05-31T23:11:02+00:00","article_modified_time":"2025-08-27T08:14:01+00:00","og_image":[{"width":252,"height":126,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/keysweeper1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes","datePublished":"2016-05-31T23:11:02+00:00","dateModified":"2025-08-27T08:14:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/"},"wordCount":631,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","keywords":["cyber espionage","identity theft"],"articleSection":["Internet Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/","name":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","datePublished":"2016-05-31T23:11:02+00:00","dateModified":"2025-08-27T08:14:01+00:00","description":"If there\u2019s one reason why classic James Bond films are so widely enjoyed, it\u2019s because of the unbeatable gadgets. From complex and indescribable to common","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/03\/Keyboard_Li.png","width":1200,"height":675,"caption":"how to run a virus scan"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/keysweeper-keylogger-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Meet KeySweeper, the Stealthy Hardware Recording Your Keystrokes"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50140"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50140\/revisions"}],"predecessor-version":[{"id":221278,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50140\/revisions\/221278"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/118564"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50140"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}