{"id":52518,"date":"2016-09-09T14:05:20","date_gmt":"2016-09-09T21:05:20","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52518"},"modified":"2025-08-31T22:12:01","modified_gmt":"2025-09-01T05:12:01","slug":"android-photo-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/","title":{"rendered":"The Android Photo Hack: A Picture Says a Thousand Commands"},"content":{"rendered":"<p>Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a giant horse statue \u2013 except maybe pranksters with a bad sense of humor \u2013 although similar tricks exist in digital form. People are wary of unknown .exe files and sudden downloads from corny pop-up ads. They trust more familiar file types such as .jpg. But in the latest incarnation of the Trojan horse, malicious code can be hidden in images, allowing cybercriminals to <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/09\/06\/google-android-one-photo-hack\/#242678215552\" target=\"_blank\" rel=\"noopener\">take over Android devices<\/a>.<\/p>\n<p>Google moves quick and has already issued an Android update. Once those software changes occur on a device, this loophole will be resolved. Another positive, this tactic hasn\u2019t been found in common use \u2013 it was a discovery by cybersecurity researcher Tim Strazzere. So ultimately, the photo hack is <em>not<\/em> a widespread threat. But people should be aware and educated nonetheless. Understanding how cybercriminals act is the first step to knowing how to stay safe online.<\/p>\n<p>Truth be told, hiding malicious code in other forms isn\u2019t a new tactic. Crooks have concocted all manner of disguises. <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/microsoft-word-malware\/\" target=\"_blank\" rel=\"noopener\">Infected Microsoft Word documents<\/a> have even been found. When users launch these infected files on their PC, malware is installed to steal sensitive information. The photo method is only the latest in this context.<\/p>\n<p>What\u2019s unique in this case is the caveat that villains can get their way without images being clicked on. Let\u2019s jump into brief technical details to explain how. When photos are sent to your Android device, some of that data is <a href=\"http:\/\/www.techworm.net\/2016\/09\/hackers-can-use-single-photo-remotely-takeover-android-smartphone.html\" target=\"_blank\" rel=\"noopener\">processed before users open the file<\/a>. This is known as <em>parsing <\/em>in computer terms: the unpacking and separating of information. See, smartphones need to know what data to process when users open a file. But first, they must look at other data to understand the nature of the file type. That\u2019s where cybercriminals could package secret instructions to be triggered from the get-go.<\/p>\n<p>What happens then? Well, the malware can \u201cbrick\u201d users\u2019 devices, meaning they are rendered unusable. Cybercriminals then gain remote access to the smartphone. With all the sensitive information our devices now store, crooks could snatch quite a bit! Think of all those financial details, passwords for online accounts, and emails. Additionally, perpetrators could even use the phone\u2019s applications to their gain, and the user\u2019s expense.<\/p>\n<p>Now remember, Google already issued an Android update to combat this \u2013 so there\u2019s no need to panic. The threat, however, should open some people\u2019s eyes. A range of sneaky threats exist out there, and education is key. This won\u2019t be the last reincarnation of the Trojan horse. But with the right security knowledge, people can help to keep themselves safe in our digital age.<\/p>\n<h2>Three Cybersecurity Tips to Keep in Mind<\/h2>\n<p>With that in mind, here are three cybersecurity tips to act on:<\/p>\n<ul>\n<li><strong>Don\u2019t over-expose yourself on social media and chat apps.<\/strong> For this photo trick to hijack your Android device, someone has to first send you an image. How will they do so? Probably over Facebook message or another chat app. So think of security in layers: at the very perimeter, don\u2019t allow just anyone to contact you. This also protects you against <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/social-media-harassment-threat\/\" target=\"_blank\" rel=\"noopener\">social media bullying<\/a>.<\/li>\n<\/ul>\n<ul>\n<li><strong>Update your device as soon as possible.<\/strong> Large companies have cybersecurity teams working to protect customers, but updates may depend on users. In this case, once Google received the report, the latest Android update was tailored to resolve the vulnerability. Make sure to update your devices and applications as well.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be wary where you browse and what you open<\/strong>. As threats evolve, cybercriminals continue to serve malware in advanced methods. Some people could receive an email with <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/microsoft-word-malware\/\" target=\"_blank\" rel=\"noopener\">an infected Microsoft Word attachment<\/a>, while others could accidentally end up on an <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/android-linux-bug-2016\/\" target=\"_blank\" rel=\"noopener\">unsecure website<\/a>. Always make sure what\u2019s on your screen is authentic. Double check email senders. Look for the official URL. Be mindful and aware.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts&#8230;<\/p>\n","protected":false},"author":674,"featured_media":132667,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[37,214],"coauthors":[3973],"class_list":["post-52518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-android","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-09T21:05:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:12:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Android Photo Hack: A Picture Says a Thousand Commands\",\"datePublished\":\"2016-09-09T21:05:20+00:00\",\"dateModified\":\"2025-09-01T05:12:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"keywords\":[\"android\",\"mobile security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\",\"name\":\"The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"datePublished\":\"2016-09-09T21:05:20+00:00\",\"dateModified\":\"2025-09-01T05:12:01+00:00\",\"description\":\"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"width\":614,\"height\":300,\"caption\":\"man using android apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Android Photo Hack: A Picture Says a Thousand Commands\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog","description":"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog","og_description":"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-09-09T21:05:20+00:00","article_modified_time":"2025-09-01T05:12:01+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Android Photo Hack: A Picture Says a Thousand Commands","datePublished":"2016-09-09T21:05:20+00:00","dateModified":"2025-09-01T05:12:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","keywords":["android","mobile security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/","name":"The Android Photo Hack: A Picture Says a Thousand Commands | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","datePublished":"2016-09-09T21:05:20+00:00","dateModified":"2025-09-01T05:12:01+00:00","description":"Most people have heard the story of the Trojan horse. We\u2019ve learned the moral of that story: don\u2019t trust gifts from strangers. Today, nobody would use a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","width":614,"height":300,"caption":"man using android apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-photo-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"The Android Photo Hack: A Picture Says a Thousand Commands"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52518"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52518\/revisions"}],"predecessor-version":[{"id":221871,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52518\/revisions\/221871"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/132667"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52518"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}