{"id":52271,"date":"2016-08-24T10:31:31","date_gmt":"2016-08-24T17:31:31","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52271"},"modified":"2025-08-15T03:07:33","modified_gmt":"2025-08-15T10:07:33","slug":"virtual-reality-facebook-photo-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/","title":{"rendered":"How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security"},"content":{"rendered":"<p>Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural icons appearing onstage <a href=\"http:\/\/www.billboard.com\/articles\/events\/bbma-2014\/6092040\/michael-jackson-hologram-billboard-music-awards\" target=\"_blank\" rel=\"noopener\">at music awards<\/a>, to CEOs attending big meetings <a href=\"https:\/\/www.washingtonpost.com\/news\/on-leadership\/wp\/2016\/04\/13\/star-wars-meets-the-c-suite-why-this-ceos-hologram-is-getting-beamed-into-meetings\/\" target=\"_blank\" rel=\"noopener\">in holographic form<\/a>. Obviously, our ability to project ourselves through virtual reality across the globe has evolved. But so are the security consequences of being able to do so.<\/p>\n<p>Those consequences were on display earlier this month at the Usenix security conference, a yearly security symposium aimed at highlighting cybersecurity issues in new technology. During this year\u2019s conference, researchers from the University of North Carolina demonstrated how <a href=\"https:\/\/www.wired.com\/2016\/08\/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck\/#slide-1\" target=\"_blank\" rel=\"noopener\">life-like animations of faces<\/a> could be used to trick facial recognition.<\/p>\n<p>To achieve this, WIRED reports, the researchers used technology similar to virtual reality and a few borrowed photos from volunteers. (While volunteers willingly gave the researchers permission, the photos were acquired in a similar fashion to how cybercriminals would acquire them, according to WIRED.) This technique cracked several security systems tested.<\/p>\n<p>As far as new technology goes, this isn\u2019t unexpected. Fledgling technologies will almost always have vulnerabilities and pitfalls during their early days. As always, security researchers are best equipped to discover the security issues embedded in these technologies.<\/p>\n<p>In <a href=\"http:\/\/www.techradar.com\/us\/news\/software\/security-software\/here-s-why-facial-recognition-tech-is-far-from-flawless-1326889\" target=\"_blank\" rel=\"noopener\">this particular case<\/a>, researchers used the virtually-stolen photos to create fake faces with readily available 3D rendering and animation software. They then blended the photos and animated the 3D images to trick facial recognition programs into thinking the fake images had both motion and depth (right down to blinking and smiling) \u2014 measurements these programs check for while scanning a face.<\/p>\n<p>It\u2019s a great reminder that it\u2019s trivial to steal high-quality photos of someone today. Even from multiple angles, which this theoretical attack requires. Crooks could simply <a href=\"http:\/\/www.digitaltrends.com\/cool-tech\/facial-recognition-hack\/\" target=\"_blank\" rel=\"noopener\">browse your Facebook<\/a>, LinkedIn and other social media profiles. As simple as it is to carry out, this form of vulnerability is a bit tricky to defend against. After all, having an online presence is important for both social and career purposes, and even the most cautious posters can\u2019t always guarantee a nonexistent digital-footprint.<\/p>\n<p>Alarming? Sure. But few should worry: the attack is too complicated, and too time consuming, for most cybercriminals to bother with. A lot of preparation \u2014 and background knowledge \u2014\u00a0is needed to successfully replicate this theoretical attack. That fact significantly narrows the number of people who may be at risk. Additionally, these vulnerabilities have been flagged to cybersecurity firms \u2014 firms who want to see this technology succeed. Fixes to these issues will be on their way shortly.<\/p>\n<p>Given this research, we should take the opportunity to revisit two issues relevant in today\u2019s digital world. First, as discussed above, maintaining a level of privacy online is important not only as a matter of lifestyle, but also as a matter of security. Our photographs are now connected to our profiles and, by extension, our security. Second, technology isn\u2019t a one-and-done thing. New innovations in everyday devices, services, and security takes time to perfect. Biometric security and similar innovations are no different.<\/p>\n<h2>Tips For Practicing Biometric Security<\/h2>\n<p>With that in mind, here are three tips for practicing biometric security:<\/p>\n<ul>\n<li><strong>Limit your online exposure. <\/strong>Make sure you set your social media preferences to \u201cprivate.\u201d This way you\u2019ll protect the images of not just yourself, but also of your loved ones. Always check your social media website of preference for privacy options. Avoid uploading images to those without them.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security. <\/strong>Good security requires a good deal of preparation\u2014and a comprehensive approach works best. By using a comprehensive security solution, like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe\u2122<\/a>, you\u2019re expanding your protection level across devices.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use multi-factor authentication.<\/strong> There are a few tried and true methods to protect yourself online. <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/two-steps-are-better-than-one-make-a-hackers-job-harder-with-two-step-verification\" target=\"_blank\" rel=\"noopener\">Two-factor and multi-factor authentication<\/a> \u2014 where a service requires verification through something you know, like a password or PIN, and something that you have, like a smartphone \u2014 is one of the more reliable security methods out there. Check the services you use online, and see if it\u2019s available for account authentication.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural&#8230;<\/p>\n","protected":false},"author":674,"featured_media":202849,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13,1838],"tags":[4733,100,4732],"coauthors":[3973],"class_list":["post-52271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","category-mobile-security","tag-biometric-security","tag-facebook","tag-virtual-reality"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Virtual Reality and Facebook Photos Hacked Biometric Security<\/title>\n<meta name=\"description\" content=\"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Virtual Reality and Facebook Photos Hacked Biometric Security\" \/>\n<meta property=\"og:description\" content=\"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-24T17:31:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T10:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security\",\"datePublished\":\"2016-08-24T17:31:31+00:00\",\"dateModified\":\"2025-08-15T10:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\"},\"wordCount\":708,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png\",\"keywords\":[\"Biometric Security\",\"facebook\",\"virtual reality\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\",\"name\":\"Virtual Reality and Facebook Photos Hacked Biometric Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png\",\"datePublished\":\"2016-08-24T17:31:31+00:00\",\"dateModified\":\"2025-08-15T10:07:33+00:00\",\"description\":\"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png\",\"width\":1000,\"height\":563,\"caption\":\"friends talking about social media\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Virtual Reality and Facebook Photos Hacked Biometric Security","description":"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Virtual Reality and Facebook Photos Hacked Biometric Security","og_description":"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-24T17:31:31+00:00","article_modified_time":"2025-08-15T10:07:33+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security","datePublished":"2016-08-24T17:31:31+00:00","dateModified":"2025-08-15T10:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/"},"wordCount":708,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png","keywords":["Biometric Security","facebook","virtual reality"],"articleSection":["Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/","name":"Virtual Reality and Facebook Photos Hacked Biometric Security","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png","datePublished":"2016-08-24T17:31:31+00:00","dateModified":"2025-08-15T10:07:33+00:00","description":"Years ago, holograms were considered science-fiction. Things have changed. Within recent memory, we\u2019ve gone from seeing well-loved, but deceased, cultural","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2013\/10\/11000x563_Blog_101724.png","width":1000,"height":563,"caption":"friends talking about social media"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/virtual-reality-facebook-photo-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How Virtual Reality and Facebook Photos Helped Researchers Hack Biometric Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52271"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52271\/revisions"}],"predecessor-version":[{"id":219862,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52271\/revisions\/219862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/202849"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52271"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}