{"id":51894,"date":"2016-08-09T09:11:23","date_gmt":"2016-08-09T16:11:23","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51894"},"modified":"2025-08-15T03:28:46","modified_gmt":"2025-08-15T10:28:46","slug":"oracle-micros-incident-2016","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/","title":{"rendered":"Another Day, Another PoS Hack. What Makes the Micros Incident Different?"},"content":{"rendered":"<p>Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated: point-of-sales systems. These types of attacks have been prominent in the news lately, with the cases of <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/fast-food-furious-malware-learnings-wendys\/\" target=\"_blank\" rel=\"noopener\">Wendy\u2019s<\/a> and Omni Hotels. But today, we have news of criminals going one step further\u2014infiltrating Oracle\u2019s technology that powers <a href=\"http:\/\/www.zdnet.com\/article\/oracle-said-to-be-investigating-data-breach-at-point-of-sale-division\/\" target=\"_blank\" rel=\"noopener\">many companies\u2019 point-of-sales (PoS) systems<\/a>: the Micros PoS system.<\/p>\n<p>The effects of this attack could be quite largescale. That\u2019s because most businesses don\u2019t create their own infrastructure for credit card payments, opting instead to buy products for handling those transactions from a technology company. So top vendors, such as Oracle\u2019s Micros, can service up to hundreds of thousands of PoS systems. Those numbers are sure to draw the attention of cybercriminals.<\/p>\n<p>According to <a href=\"https:\/\/krebsonsecurity.com\/2016\/08\/data-breach-at-oracles-micros-point-of-sale-division\/\" target=\"_blank\" rel=\"noopener\">Brian Krebs&#8217; report<\/a>, after their interest was piqued, crooks began this particular attack at Oracle\u2019s customer support portal. At the portal login, the organized cybercrime ring inserted malicious code, allowing them to steal the usernames and passwords of business accounts. With that information, perpetrators can gain remote access and manipulate PoS systems around the world.<\/p>\n<p>That\u2019s certainly not a good situation, but there is a silver lining. People\u2019s payment data is not at risk\u2014there\u2019s no need to worry about attackers having your credit card numbers. As Oracle explained via email, \u201cpayment card data is encrypted both at rest and in transit in the Micros hosted customer environments.\u201d<\/p>\n<p>What is at stake, however, is not yet clear. The vulnerability was very recently discovered, and investigators are still mapping out the full implications. Oracle has asked its Micros customers to change their passwords, but we\u2019re still waiting to see what follows. In the meantime, this incident should remind everyone to be careful with their financial data.<\/p>\n<h2>Security Tips to Protect Your Financials<\/h2>\n<p>Here are some security tips for all of us, to keep our financials on lockdown:<\/p>\n<ul>\n<li><strong>Be suspicious of dubious transactions. <\/strong>Beware of devices that criminals sneakily place onto card readers. Some ATMs, for example, can be at risk due to attached <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/what-is-atm-skimming\/\" target=\"_blank\" rel=\"noopener\">&#8220;skimmers.&#8221;<\/a> Although this Oracle incident was different in nature, most point-of-sale attacks are attempts at stealing consumer payment information.<\/li>\n<\/ul>\n<ul>\n<li><strong>Check your statements and contact for help.<\/strong> Taking a regular look at your bank statements and activity isn\u2019t just sound accounting, it\u2019s also a security matter. The Oracle attack&#8217;s perpetrators gained the ability to edit stores\u2019 sales records, which may affect you if you turn up in a victimized store\u2019s customer list. Regardless of this ability, there is a myriad of ways cybercriminals can get your card data. Look out for unusual behavior in your accounts, so you can report it.<\/li>\n<\/ul>\n<ul>\n<li><strong>Watch out for malware.<\/strong> These days, many sales happen online. Cybercriminals can put up false webpages for people to enter their card information. Keep an eye out for the official URL, and make use of a comprehensive security solution like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe\u2122<\/a>.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are&#8230;<\/p>\n","protected":false},"author":674,"featured_media":157253,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[3946,4562,142,180],"coauthors":[3973],"class_list":["post-51894","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-credit-card-fraud","tag-ecommerce","tag-tag-identity-theft","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-09T16:11:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T10:28:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Another Day, Another PoS Hack. What Makes the Micros Incident Different?\",\"datePublished\":\"2016-08-09T16:11:23+00:00\",\"dateModified\":\"2025-08-15T10:28:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\"},\"wordCount\":537,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"keywords\":[\"credit card fraud\",\"E-Commerce\",\"identity theft\",\"malware\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\",\"name\":\"Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"datePublished\":\"2016-08-09T16:11:23+00:00\",\"dateModified\":\"2025-08-15T10:28:46+00:00\",\"description\":\"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png\",\"width\":614,\"height\":300,\"caption\":\"typing codes to stop hackers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Another Day, Another PoS Hack. What Makes the Micros Incident Different?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog","description":"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog","og_description":"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-09T16:11:23+00:00","article_modified_time":"2025-08-15T10:28:46+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Another Day, Another PoS Hack. What Makes the Micros Incident Different?","datePublished":"2016-08-09T16:11:23+00:00","dateModified":"2025-08-15T10:28:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/"},"wordCount":537,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","keywords":["credit card fraud","E-Commerce","identity theft","malware"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/","name":"Another Day, Another PoS Hack. What Makes the Micros Incident Different? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","datePublished":"2016-08-09T16:11:23+00:00","dateModified":"2025-08-15T10:28:46+00:00","description":"Motivated by money, cybercriminals are always chasing where it goes. That greed has now led them to where transactions are most concentrated:","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/08\/614x300_Blog_stophackers.png","width":614,"height":300,"caption":"typing codes to stop hackers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/oracle-micros-incident-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Another Day, Another PoS Hack. What Makes the Micros Incident Different?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51894"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51894\/revisions"}],"predecessor-version":[{"id":219866,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51894\/revisions\/219866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/157253"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51894"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}