{"id":51123,"date":"2016-07-08T10:55:14","date_gmt":"2016-07-08T17:55:14","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51123"},"modified":"2025-08-15T05:11:08","modified_gmt":"2025-08-15T12:11:08","slug":"botnets-use-iot-devices","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/","title":{"rendered":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets"},"content":{"rendered":"<p>Charles Strite, according to <a href=\"http:\/\/lemelson.mit.edu\/resources\/charles-p-strite\" target=\"_blank\" rel=\"noopener\">Lemelson-MIT<\/a>, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for simultaneously warming two sides of a slice of bread before ejecting the finished product \u2014 toast \u2014 with a familiar springy *pop*. The device\u2019s design was so successful that it has largely remained the same since 1926, dutifully popping toast across America for close to a century.<\/p>\n<p>For some, this means <a href=\"http:\/\/www.cnet.com\/news\/appliance-science-the-internet-of-toasters-and-other-things\/\" target=\"_blank\" rel=\"noopener\">the toaster is due for an upgrade<\/a> to the Internet of Things (IoT) \u2014 a network of internet-connected devices that talk to one another and to internet-based services for better efficiency, automation and convenience. The toaster isn\u2019t alone. Fridges, washing machines, vacuum cleaners and a plethora of additional appliances are gaining connectivity under the IoT umbrella in the hopes of making our lives easier.<\/p>\n<p>But many of these devices lack sophisticated security measures, which makes them easy pickings for cybercriminals. They\u2019re desirable targets, too, because IoT devices can easily be conscripted into <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/what-a-botnet-is\" target=\"_blank\" rel=\"noopener\">botnets<\/a> \u2014 networks of hijacked computers used to amplify attacks, flood servers and otherwise cause mayhem on a targeted website. In fact, according to <a href=\"http:\/\/motherboard.vice.com\/read\/in-the-future-hackers-will-build-zombie-armies-from-internet-connected-toasters\" target=\"_blank\" rel=\"noopener\">Motherboard\u2019s Lorenzo Franceschi-Bicchierai<\/a>, some cybercriminals have just used IoT devices in their own botnet attack.<\/p>\n<p>According to Motherboard, a group of cybercriminals used an IoT-based botnet to launch a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/denial-service-attack\" target=\"_blank\" rel=\"noopener\">Distributed Denial of Service<\/a> (DDoS) attack \u2014 an attack that uses a collection of computing devices to flood a target server with so much traffic that it cannot operate. The target was an unnamed jewelry store\u2019s website. The eye-popping fact, however, was that the attack employed more than 25,000 internet-connected CCTV cameras.<\/p>\n<p>So a growing development in cybercriminal capabilities \u2014 crooks using IoT devices in attacks \u2014 is now officially a reality. How did it happen? Well, as the case with many early IoT devices, the fault lies within the weak default passwords many manufacturers employ when they sell these new devices. These passwords include everything from \u201cadmin123\u201d to the product\u2019s name. Complicating this is the fact that many IoT device manufacturers rarely, if ever, update their devices to fix known vulnerabilities.<\/p>\n<p>The ease in which IoT devices can be hijacked is a big problem. The solution, however, starts with developing IoT devices with security in mind. Everything in these devices, from the chipset on upwards, will need to be deployed with the ability to be updated by manufacturers and secured with anti-malware solutions from the get-go.<\/p>\n<h2>Tips to Protect Your IoT Devices<\/h2>\n<p>So what can you do, as an individual, to protect your IoT devices from cybercriminals? Well, here are a few tips:<\/p>\n<ul>\n<li><strong>Change the default password.<\/strong> This cannot be emphasized enough: change the default password on your IoT device. Passwords should be complex, at least eight characters long and include numbers, upper and lower-case letters and symbols. If you\u2019re worried about forgetting the password, consider investing in a password management solution, like\u00a0<a href=\"https:\/\/www.truekey.com\/?utm_source=Garyblogk&amp;utm_medium=social_media&amp;utm_campaign=generic_links\" target=\"_blank\" rel=\"noopener\">True Key<\/a>.<\/li>\n<\/ul>\n<ul>\n<li><strong>Secure your network.<\/strong> Your router \u2014 the device that connects your devices to the internet \u2014 also needs to be secure. Be sure to change your router\u2019s default password and make sure it\u2019s broadcasting as a private network. A lock symbol should appear next to its name when you look it up on a device. Refer to your router\u2019s manual if you\u2019re unsure how to do this.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security.<\/strong> Cybercriminals aren\u2019t just after new IoT devices \u2014 they\u2019re after your laptops and desktops as well. Defend your devices with a comprehensive security solution like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe<\/a>, which can help protect all of your devices from the latest and most advance attacks cybercriminals can muster.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a> and <a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a> on Twitter, and &#8216;Like&#8217; us on <a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a&#8230;<\/p>\n","protected":false},"author":674,"featured_media":53452,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[49,4131],"coauthors":[3973],"class_list":["post-51123","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-botnet","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-08T17:55:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T12:11:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets\",\"datePublished\":\"2016-07-08T17:55:14+00:00\",\"dateModified\":\"2025-08-15T12:11:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png\",\"keywords\":[\"botnet\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\",\"name\":\"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png\",\"datePublished\":\"2016-07-08T17:55:14+00:00\",\"dateModified\":\"2025-08-15T12:11:08+00:00\",\"description\":\"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png\",\"width\":650,\"height\":434,\"caption\":\"IoT cybersecurity visual representation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog","description":"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog","og_description":"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-07-08T17:55:14+00:00","article_modified_time":"2025-08-15T12:11:08+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets","datePublished":"2016-07-08T17:55:14+00:00","dateModified":"2025-08-15T12:11:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png","keywords":["botnet","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/","name":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png","datePublished":"2016-07-08T17:55:14+00:00","dateModified":"2025-08-15T12:11:08+00:00","description":"Charles Strite, according to Lemelson-MIT, first introduced the modern toaster in 1926. It was, and remains to this day, a handy instrument for","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.png","width":650,"height":434,"caption":"IoT cybersecurity visual representation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/botnets-use-iot-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Update Your Toaster: How IoT Devices Can Be Conscripted into Botnets"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51123"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51123\/revisions"}],"predecessor-version":[{"id":219873,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51123\/revisions\/219873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/53452"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51123"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}