{"id":52342,"date":"2016-08-30T06:00:58","date_gmt":"2016-08-30T13:00:58","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52342"},"modified":"2025-08-06T21:51:44","modified_gmt":"2025-08-07T04:51:44","slug":"four-mobile-security-threats","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/","title":{"rendered":"The Four Mobile Security Threats You Need to Know About"},"content":{"rendered":"<p>\u201cFlorals for Spring, groundbreaking.\u201d There are few movie quotes that continue to resonate as much as the line delivered by Meryl Streep\u2019s character in the modern classic \u201cThe Devil Wears Prada\u201d. The line sparked memes galore, poked fun at the showy culture surrounding fashion, and mocked the pressure our society places on keeping up with <em>cool<\/em>. Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest <em>tech<\/em> trends.<\/p>\n<p>Taking precautions to keep your device protected with comprehensive mobile security takes some of the load off. <a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/fourmobilesecuritythreats?path=blogs\">McAfee Mobile Security<\/a>, free for both\u00a0<a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/fourmobilesecuritythreats?path=blogs\" target=\"_blank\" rel=\"noopener\">Android<\/a>\u00a0and\u00a0<a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/fourmobilesecuritythreats?path=blogs\" target=\"_blank\" rel=\"noopener\">iOS<\/a>, helps to protect your device, your data, and your privacy.<\/p>\n<p>One of hackers\u2019 favorite accessories is one of ours, too: the mobile device. These handy gadgets are always by our sides and in our (last season\u2019s) handbags, so it\u2019s only natural that they are one of the biggest targets for attacks. Partner our reliance on these devices with the general lack of education around mobile security, and you\u2019ve got a recipe for trouble. We hear about threats on the news and in our feeds, but as they continue to evolve, it\u2019s hard to keep up.<\/p>\n<p>Here\u2019s our list of the four mobile security trends you need to know about this season:<\/p>\n<ol>\n<li>\n<h2><strong><u>Trust No App <\/u><\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Who doesn\u2019t love apps? There\u2019s an app that tells you exactly how far away the bus is, where your kids are, or how to translate a menu. If you\u2019re like me, you probably have dozens of apps on your devices, some of which haven\u2019t been touched in months or even years. When it comes to mobile apps, they\u2019re not all our friends. Among the good guys are plenty of bad guys, waiting for you to hit \u2018download\u2019 so that they can launch onto your device and go wild, including stealing your personal information, conducting financial transactions, and loading viruses. Nobody likes any of those things, so keep your device safe! Be <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/autorooting-malware-threat\/\" target=\"_blank\" rel=\"noopener\">picky with your downloads<\/a>, delete unused apps, and always read the security agreements.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong><u>Watch Out for Bad Guys<\/u><\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Remember when you were a kid and you\u2019d lose your shoe (just one) or a textbook? Mom always came to the rescue to help save the day. Today, there\u2019s something even scarier than losing your shoe\u2014your mobile device is your wallet, alarm clock, and email all wrapped into one. Everyone dreads that moment when you check your pockets and bag, looking for your device and come up empty. Aside from the money you spent on your device, it\u2019s your data that you really lose. Device theft is a growing trend, one used to make extra cash and even to gain access to personal information. To keep your device safe if it <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/land-of-lost-mobile-phones\/\" target=\"_blank\" rel=\"noopener\">lands in the wrong hands<\/a>, lock it with a PIN, and always, always, back up your data.<\/p>\n<ol start=\"3\">\n<li>\n<h2><strong><u>Connect to Wi-Fi with Caution <\/u><\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Restaurants have signs in their windows that say \u201cFree Wi-Fi\u201d and malls and hotels automatically prompt you to log on. As we become increasingly connected, easy-to-access Wi-Fi is almost a guarantee. As tempting as it can be to join a network named \u201cFree, Fast Internet,\u201d on your mobile device, if it sounds too good to be true, it probably is. Connecting to an unsecured Wi-Fi network leaves your device vulnerable to hackers, and everything held within it. Places like airports and convention centers often have public Wi-Fi which can be secured\u2014score! But for every secure network, a knock off created by hackers is sure to follow. There are many steps you can take to surf the public web without asking to get hacked, including paying for private access and double-checking security. Here are some helpful <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/location-sharing-apps\/\" target=\"_blank\" rel=\"noopener\">tips<\/a>.<\/p>\n<ol start=\"4\">\n<li>\n<h2><strong><u>Throw It in the Cloud<\/u><\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Just a few short years ago, \u201cclouds\u201d were those big, fluffy objects floating in the sky. Today, the network of servers that we refer to as the cloud is everywhere and made up of everything. We rely on the cloud to store our data, backup our contacts (don\u2019t wait until you drop your phone to do this), and communicate with coworkers. As we\u2019ve become increasingly reliant on the cloud\u2019s benefits, do you ever stop and wonder if there\u2019s a guard keeping your information safe in the cloud? A recent McAfee survey found that, of cloud storage providers, \u201csome 40 percent are failing to protect files.\u201d If this number makes you nervous, it should. We trust the cloud with our most private details, from personal to professional, and a strong defense is needed to keep that data, and your device, safe. To do so, only use cloud providers which you trust, read their privacy agreement, and think before you share.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cFlorals for Spring, groundbreaking.\u201d There are few movie quotes that continue to resonate as much as the line delivered by&#8230;<\/p>\n","protected":false},"author":674,"featured_media":154456,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[4238,4132,214],"coauthors":[3973],"class_list":["post-52342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-mcafee-mobile-security","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Four Mobile Security Threats You Need to Know About | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Four Mobile Security Threats You Need to Know About | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-30T13:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-07T04:51:44+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Four Mobile Security Threats You Need to Know About\",\"datePublished\":\"2016-08-30T13:00:58+00:00\",\"dateModified\":\"2025-08-07T04:51:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"keywords\":[\"McAfee Mobile Security\",\"mobile app\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\",\"name\":\"The Four Mobile Security Threats You Need to Know About | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"datePublished\":\"2016-08-30T13:00:58+00:00\",\"dateModified\":\"2025-08-07T04:51:44+00:00\",\"description\":\"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png\",\"width\":1250,\"height\":675,\"caption\":\"mobile finance apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Four Mobile Security Threats You Need to Know About\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Four Mobile Security Threats You Need to Know About | McAfee Blog","description":"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Four Mobile Security Threats You Need to Know About | McAfee Blog","og_description":"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-30T13:00:58+00:00","article_modified_time":"2025-08-07T04:51:44+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Four Mobile Security Threats You Need to Know About","datePublished":"2016-08-30T13:00:58+00:00","dateModified":"2025-08-07T04:51:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/"},"wordCount":809,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","keywords":["McAfee Mobile Security","mobile app","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/","name":"The Four Mobile Security Threats You Need to Know About | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","datePublished":"2016-08-30T13:00:58+00:00","dateModified":"2025-08-07T04:51:44+00:00","description":"Cybercriminals are all about keeping up with trends\u2014no, not ski masks and gloves\u2014but hacking the latest tech trends.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/1250x675_Blog_mobilefinanceapps.png","width":1250,"height":675,"caption":"mobile finance apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/four-mobile-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"The Four Mobile Security Threats You Need to Know About"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52342"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52342\/revisions"}],"predecessor-version":[{"id":214252,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52342\/revisions\/214252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154456"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52342"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}