{"id":52203,"date":"2016-08-19T10:13:25","date_gmt":"2016-08-19T17:13:25","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52203"},"modified":"2025-08-06T22:33:56","modified_gmt":"2025-08-07T05:33:56","slug":"80-of-android-phones-are-at-risk","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/","title":{"rendered":"80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety"},"content":{"rendered":"<p>Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be curious. Would you be able to explain how it works? Most people wouldn\u2019t, for a reason\u2014smartphones are designed to be easy to use. And this can create a problem: tech-savvy criminals may view non-technical <em>consumers <\/em>as medieval peasants, prime for swindling. In recent days, that seems like the case. Cyber-crooks have tried their hands at <a href=\"http:\/\/www.pcmag.com\/news\/347048\/linux-bug-puts-android-devices-at-risk\" target=\"_blank\" rel=\"noopener\">a new tactic<\/a>, based on a technical component of Android phones called the Linux kernel.<\/p>\n<p>To understand this method, some background information is in order. Software is built in layers. Think of how a house is constructed. The roof is supported by walls, supported by scaffolding, supported by a foundation. It\u2019s the same for operating systems, like Android. Specifically, the Linux kernel is a foundational layer in Android devices. It defines how applications interact with the device\u2019s hardware.<\/p>\n<p>Consequently, if cybercriminals can <a href=\"http:\/\/www.digitaltrends.com\/mobile\/android-hack-80-percent-users-linux\/\" target=\"_blank\" rel=\"noopener\">exploit the Linux kernel<\/a>, they can tap into your phone directly. This is a step up from traditional attacks, where rogues typically have to infiltrate a website to send your device malicious instructions. With the new method, that\u2019s not necessary\u2014your device\u2019s behavior can be altered without the middleman.<\/p>\n<p>What does this all mean? Imagine this: you happen to land on a website, which unbeknown to you, isn\u2019t secured. Suddenly, your phone shows a login prompt.\u00a0After entering your username and password, that info is now in perpetrator\u2019s hands. Criminals have controlled your device\u2019s behavior from deep within its own software. And experts estimate that the Linux kernel issue could affect up to 80% of Android phones. That\u2019s <a href=\"http:\/\/www.computerworld.com\/article\/3108618\/security\/1-4-billion-android-devices-vulnerable-to-hijacking-thanks-to-linux-tcp-bug.html\" target=\"_blank\" rel=\"noopener\">1.4 billion devices<\/a>!<\/p>\n<p>Now, before anyone panics, there are <a href=\"http:\/\/arstechnica.com\/security\/2016\/08\/linux-bug-leaves-1-4-billion-android-users-vulnerable-to-hijacking-attacks\/\" target=\"_blank\" rel=\"noopener\">some important caveats<\/a> that should help you feel at ease about using an Android smartphone. Crooks can\u2019t simply remotely access your phone. To pull this trick off, they must tap into a connection from your device like a website, message, or a link shared in their news feed. Specifically, they need to know the IP address and source. Even then, it would take 10 seconds to test the connection, then 45 seconds to inject malicious code. So this attack isn\u2019t likely to be used in bulk against your average Joe.<\/p>\n<p>At the same time, it\u2019s important for people to be aware of security issues, big and small. The more educated users are, the better they can protect themselves. Since we know the Linux kernel hack needs access to connections to your phone, for example, we can defend against this loophole being exploited. By using encrypted communications, cybercriminals can be denied entry from the get-go.<\/p>\n<h2>The Benefits of Encryption<\/h2>\n<p>Here are some tips to make use of, that explain how encryption can secure your Android:<\/p>\n<ul>\n<li><strong>When visiting websites on mobile, look for the \u201cs\u201d in \u201chttps\u201d. <\/strong>There are standards of web traffic that ensure that your connection is safe, but not all websites follow them. Luckily, you can spot the safe ones you visit on your phone. To do so, simply check if the website address begins with \u201chttps.\u201d In the case of some browsers, that part is hidden, but there will typically be built-in features to let you know if a site is secure.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use reputable web and mobile apps.<\/strong> When large companies have many users and plenty of resources, they make a strong effort to secure their apps. For example, Gmail encrypts not only the content of the messages, but also the transit <a href=\"https:\/\/www.google.com\/transparencyreport\/saferemail\/faq\/#how_does_encryption_in_transit\" target=\"_blank\" rel=\"noopener\">connection<\/a>. Try to avoid mysterious, third-party apps.<\/li>\n<\/ul>\n<ul>\n<li><strong>Make sure to update your Android.<\/strong> As security problems are discovered, companies update their software to put new defenses in place. While this Linux kernel issue affects new versions of Android, rather than old ones, that\u2019s actually the exception. Generally, it\u2019s always good to update your device\u2014especially as encryption technologies improve.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange&#8230;<\/p>\n","protected":false},"author":674,"featured_media":132667,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,214],"coauthors":[3973],"class_list":["post-52203","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>80% of Android Phones are at Risk! Here&#039;s Why.<\/title>\n<meta name=\"description\" content=\"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"80% of Android Phones are at Risk! Here&#039;s Why.\" \/>\n<meta property=\"og:description\" content=\"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-19T17:13:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T05:33:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety\",\"datePublished\":\"2016-08-19T17:13:25+00:00\",\"dateModified\":\"2025-08-07T05:33:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\"},\"wordCount\":695,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"keywords\":[\"android\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\",\"name\":\"80% of Android Phones are at Risk! Here's Why.\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"datePublished\":\"2016-08-19T17:13:25+00:00\",\"dateModified\":\"2025-08-07T05:33:56+00:00\",\"description\":\"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"width\":614,\"height\":300,\"caption\":\"man using android apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"80% of Android Phones are at Risk! Here's Why.","description":"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"80% of Android Phones are at Risk! Here's Why.","og_description":"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-19T17:13:25+00:00","article_modified_time":"2025-08-07T05:33:56+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety","datePublished":"2016-08-19T17:13:25+00:00","dateModified":"2025-08-07T05:33:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/"},"wordCount":695,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","keywords":["android","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/","name":"80% of Android Phones are at Risk! Here's Why.","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","datePublished":"2016-08-19T17:13:25+00:00","dateModified":"2025-08-07T05:33:56+00:00","description":"Let\u2019s imagine you traveled back in time, smartphone in pocket. Let\u2019s say a medieval peasant sees you using this strange device. Naturally, they\u2019d be","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","width":614,"height":300,"caption":"man using android apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/80-of-android-phones-are-at-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"80% of Android Phones Are at Risk! Luckily, People Can Use Encryption for Safety"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52203"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52203\/revisions"}],"predecessor-version":[{"id":214150,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52203\/revisions\/214150"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/132667"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52203"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}