{"id":52626,"date":"2016-09-15T09:42:22","date_gmt":"2016-09-15T16:42:22","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52626"},"modified":"2025-08-06T09:20:52","modified_gmt":"2025-08-06T16:20:52","slug":"calljam-malware-2016","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/","title":{"rendered":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers, and even do office work from the beach. But remember old-school flip-phones? They stood for one purpose \u2013 simply to make calls \u2013 and we all had them. Well, it turns out that basic function of dialing a number is as relevant as ever, especially for cybercriminals. In fact, they\u2019ve recently hijacked as many as half a million Android phones just to make calls, using the <a href=\"http:\/\/www.techweekeurope.co.uk\/mobility\/google-play-malware-premium-calls-197557\" target=\"_blank\" rel=\"noopener\">CallJam malware<\/a>.<\/p>\n<p>CallJam is unique among existing malware \u2013 applications that let crooks manipulate devices\u2019 behavior \u2013 because of its peculiar goal. After smartphones are infected, unlucky users will see their mobiles <a href=\"https:\/\/androidcommunity.com\/calljam-malware-now-in-google-play-racks-up-cash-for-hackers-thru-premium-calls-20160910\/\" target=\"_blank\" rel=\"noopener\">dial up mysterious numbers<\/a> from around the globe.<\/p>\n<p>Now, that seems strange at first, primarily because of motive. Why would criminals do this? They\u2019re not interested in deep and meaningful conversations. A person isn\u2019t even necessarily on the other end of the call, ruling out illicit persuasion as a motivator. Truth be told, the heart of the matter is likely telecommunications fraud.<\/p>\n<p>In the past, criminals have used a tactic that involved <a href=\"http:\/\/www.nytimes.com\/2014\/10\/20\/technology\/dial-and-redial-phone-hackers-stealing-billions-.html?_r=0\" target=\"_blank\" rel=\"noopener\">leased premium phone numbers<\/a> \u2013 the ones that charge an incredibly high price-per-minute \u2013 and profit-sharing. Essentially, perpetrators negotiate to receive a kickback from the number\u2019s owner in exchange for directing calls to it. There\u2019s a simple rationale that makes this lucrative. When costly calls are made, somebody has to pay for it. Large sums on the user\u2019s balance sheet can translate into more money padding up villains\u2019 coffers.<\/p>\n<p>While nobody has officially verified this as the motive for CallJam, this type of fraud has been on our radar for a while. The difference this time is that the rogues are pulling off this trick by infecting mobile phones, rather than landlines.<\/p>\n<p>The infection starts when a user unknowingly downloads a malicious app. Think about the last time you browsed Google Play, the official Android marketplace. There\u2019s a plethora of apps to draw your interest! Although Google has stringent safeguards to ensure their safety, clever criminals may sneak malicious programs among them. That\u2019s exactly <a href=\"https:\/\/www.grahamcluley.com\/2016\/09\/calljam-malware-infects-androids-keeps-ringing-premium-rate-numbers\/\" target=\"_blank\" rel=\"noopener\">what happened with CallJam<\/a>. It was disguised within the \u201cGems Chest for Clash Royale\u201d app. Uploaded in May, it has unfortunately been downloaded 100,000 to 500,000 times.<\/p>\n<p>After installation, the malware starts doing damage. CallJam actually contains a number of technically sophisticated commands, including <a href=\"http:\/\/arstechnica.com\/security\/2016\/09\/two-critical-bugs-and-more-malicious-apps-make-for-a-bad-week-for-android\/\" target=\"_blank\" rel=\"noopener\">sending web browsers to ad-serving websites<\/a>. However, for routing calls, there\u2019s no wizardry involved at all. In fact, you may not believe how basic the trick is: the app simply asks users for permission to use the phone.<\/p>\n<p>You see, when Android apps are installed, a pop-up window typically appears, asking for permission to access other device features. For example, messaging services may want to scan your contacts to let you chat with them, or ride-sharing services may need GPS to identify pick-up locations. Now, users can always deny these permissions. But in this case, many consumers must not have fully understood or read them. In the end, many people simply gave crooks permission to access their dial pad.<\/p>\n<p>Now, Google has already <a href=\"https:\/\/www.engadget.com\/2016\/09\/10\/google-fixes-serious-android-security-flaws\/\" target=\"_blank\" rel=\"noopener\">removed CallJam<\/a> from its marketplace and issued updates to combat this form of malware. That means it\u2019s no longer easily downloadable. However, this incident still contains key lessons for anyone with a smartphone in their pocket. As convenient as installing apps can be, let\u2019s not forget the dangers they can pose in the form of malicious code. And when it comes to villains trying to pull their scams, let\u2019s not overlook our phones\u2019 core function: making calls.<\/p>\n<h2>Three tips to keep your smartphone safe:<\/h2>\n<ul>\n<li><strong>Read app permissions carefully.<\/strong> Does a game really need access to your call history? Why does a weather widget want to access your camera? Take the time to read all the access that applications ask you to grant, and make sure to turn down any suspicious or unnecessary requests.<\/li>\n<\/ul>\n<ul>\n<li><strong>Research before installing apps.<\/strong> If you read CallJam\u2019s reviews, you\u2019d see a few red flags. Many users complained about their mobiles forced to repeatedly make long-distance calls. So take the time to thoroughly check out reviews and comments, and don\u2019t rely solely on an application\u2019s rating.<\/li>\n<\/ul>\n<ul>\n<li><strong>Don\u2019t return missed calls from unknown numbers. <\/strong>In <a href=\"https:\/\/www.fcc.gov\/consumers\/guides\/one-ring-wireless-phone-scam\" target=\"_blank\" rel=\"noopener\">another version of phone call fraud<\/a>, rogues will first ring up victims\u2019 phones, then await a return dial. These numbers can even be made to appear as local area codes! So don\u2019t chase down unknown numbers. True friends will ring you up again later.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/mcafee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage&#8230;<\/p>\n","protected":false},"author":674,"featured_media":173688,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,180,4132,214],"coauthors":[3973],"class_list":["post-52626","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-malware","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-15T16:42:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T16:20:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware\",\"datePublished\":\"2016-09-15T16:42:22+00:00\",\"dateModified\":\"2025-08-06T16:20:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\"},\"wordCount\":805,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png\",\"keywords\":[\"android\",\"malware\",\"mobile app\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\",\"name\":\"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png\",\"datePublished\":\"2016-09-15T16:42:22+00:00\",\"dateModified\":\"2025-08-06T16:20:52+00:00\",\"description\":\"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png\",\"width\":614,\"height\":300,\"caption\":\"remcosrat malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog","description":"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog","og_description":"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-09-15T16:42:22+00:00","article_modified_time":"2025-08-06T16:20:52+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware","datePublished":"2016-09-15T16:42:22+00:00","dateModified":"2025-08-06T16:20:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/"},"wordCount":805,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png","keywords":["android","malware","mobile app","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/","name":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png","datePublished":"2016-09-15T16:42:22+00:00","dateModified":"2025-08-06T16:20:52+00:00","description":"&nbsp; As smartphones get more sophisticated, it\u2019s easy to forget their humble origins. Through today\u2019s mobile apps, we can manage finances, order Ubers,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/08\/614x300_Blog_RemcosRat-Malware.png","width":614,"height":300,"caption":"remcosrat malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/calljam-malware-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Why Cybercriminals Want to Rack Up Your Phone Bill: The CallJam Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=52626"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52626\/revisions"}],"predecessor-version":[{"id":214220,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/52626\/revisions\/214220"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/173688"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=52626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=52626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=52626"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=52626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}