{"id":62875,"date":"2016-10-28T14:41:04","date_gmt":"2016-10-28T21:41:04","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=62875"},"modified":"2025-08-15T02:48:54","modified_gmt":"2025-08-15T09:48:54","slug":"iot-devices-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/","title":{"rendered":"Unsecured IoT Devices Behind Last Week&#8217;s DDoS Attack, More Likely to Come"},"content":{"rendered":"<p>A hyper-connected world offers a lot of benefits, but it also comes with a lot of risk. President Obama has said it himself. Just this past week on Jimmy Kimmel Live, he wondered aloud, \u201cHow do we continue to get all the benefits of being in cyberspace, but protect our finances, protect our privacy? What is true is that we are all connected. We&#8217;re all wired now.\u201d And he\u2019s right. We are all wired these days, mostly due to the <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/security-internet-of-things\/\" target=\"_blank\" rel=\"noopener\">Internet of Things<\/a> (IoT), an ever-growing network of physical objects that have network connectivity, allowing them to send and receive data. IoT devices range from webcams to DVRs, and its market is booming. And unfortunately, with this boom comes one in IoT-specific attacks, with the most <a href=\"http:\/\/www.computerworld.com\/article\/3134025\/security\/dns-provider-dyn-hit-by-ddos-attack-that-takes-out-major-sites.html\" target=\"_blank\" rel=\"noopener\">recent one occurring across the entire East Coast<\/a>.<\/p>\n<p>This massive attack saw thousands of IoT devices transformed into botnets, thanks to a malware variant called Mirai. Cybercriminals used this army of infected IoT devices, then constructed one of the largest DDoS (<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/denial-service-attack\" target=\"_blank\" rel=\"noopener\">Distributed Denial of Service<\/a>) attacks in recent history. Their target was a DNS provider called Dyn, which temporarily knocked major sites such as Twitter, Github, and Etsy offline.<\/p>\n<p>These crooks used IoT devices for a reason \u2013 they\u2019re user-friendly, accessible, and don\u2019t always have stringent security standards. This makes them <a href=\"http:\/\/www.computerworld.com\/article\/3135285\/security\/ddos-attack-shows-dangers-of-iot-running-rampant.html\" target=\"_blank\" rel=\"noopener\">easily manipulated by attackers<\/a>.<\/p>\n<p>So how exactly were the crooks able to pull off this attack? Two words: default passwords.<\/p>\n<p>The majority of IoT devices are shipped out to users with default passwords already set by factory manufacturers. Though the intention is to make setup easier, or access more streamlined, these default passwords are an open invitation for hacks. Default passwords and usernames are relatively easy for hackers to guess and crack. In some cases, they can pull up lists of defaults with a simple internet search. In addition, automatic updates aren\u2019t always a feature for IoT devices, which makes it more difficult for security patches to be applied when flaws are discovered.<\/p>\n<p>In summary, IoT devices are, in cases like these, sitting ducks. But one great thing came out of this DDoS attack: it got people\u2019s attention. Important people\u2019s attention. IT professionals and government officials alike are now recognizing the security issues demanding resolution across connected devices. The conclusion: IoT devices need to be held to higher security standards, and action is increasingly being taken.<em>\u00a0<\/em><\/p>\n<h2>How to Protect Your Connected Devices<\/h2>\n<p>As smart devices continue to hit the shelves at break-neck speed, security standards for connected gadgets are no longer just a concern, they\u2019re a necessity. Manufacturers of IoT products must take additional security measures before devices hit the retail floor, and users must do their own part to ensure their security with the connected gadgets they buy.<\/p>\n<p>As IoT security continues to progress, here are a few tips to keep in mind if you use connected devices:<\/p>\n<ol>\n<li><strong>Change your default passwords.<\/strong> I\u2019ve said it before, but it bears repeating: reset the default password on your connected device the moment you bring it home. Make sure your password is long, strong, and unique. And if you\u2019re someone who has trouble remembering multiple passwords (I\u2019m sure you have more than one device you\u2019re password-protecting), turn to a password management solution. \u00a0<strong>\u00a0<\/strong><\/li>\n<li><strong>Keep security top of mind when buying an IoT device. <\/strong>When you\u2019re thinking of making your next IoT gadget purchase, make sure to do your research first. Start by looking up the device in question\u2019s security standards. A simple Google search on the product, as well as the manufacturer, will often do the trick.<\/li>\n<\/ol>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home\u00a0<\/a>on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><em>\u00a0<img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A hyper-connected world offers a lot of benefits, but it also comes with a lot of risk. President Obama has&#8230;<\/p>\n","protected":false},"author":674,"featured_media":64078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4131],"coauthors":[3973],"class_list":["post-62875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Unsecured IoT Devices Behind Last Week&#039;s DDoS Attack, More Likely to Come | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unsecured IoT Devices Behind Last Week&#039;s DDoS Attack, More Likely to Come | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T21:41:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T09:48:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Unsecured IoT Devices Behind Last Week&#8217;s DDoS Attack, More Likely to Come\",\"datePublished\":\"2016-10-28T21:41:04+00:00\",\"dateModified\":\"2025-08-15T09:48:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"keywords\":[\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\",\"name\":\"Unsecured IoT Devices Behind Last Week's DDoS Attack, More Likely to Come | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"datePublished\":\"2016-10-28T21:41:04+00:00\",\"dateModified\":\"2025-08-15T09:48:54+00:00\",\"description\":\"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"width\":1000,\"height\":667,\"caption\":\"IoT Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Unsecured IoT Devices Behind Last Week&#8217;s DDoS Attack, More Likely to Come\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unsecured IoT Devices Behind Last Week's DDoS Attack, More Likely to Come | McAfee Blog","description":"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Unsecured IoT Devices Behind Last Week's DDoS Attack, More Likely to Come | McAfee Blog","og_description":"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-10-28T21:41:04+00:00","article_modified_time":"2025-08-15T09:48:54+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Unsecured IoT Devices Behind Last Week&#8217;s DDoS Attack, More Likely to Come","datePublished":"2016-10-28T21:41:04+00:00","dateModified":"2025-08-15T09:48:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","keywords":["Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/","name":"Unsecured IoT Devices Behind Last Week's DDoS Attack, More Likely to Come | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","datePublished":"2016-10-28T21:41:04+00:00","dateModified":"2025-08-15T09:48:54+00:00","description":"Cybercriminals used an army of infected IoT devices, then constructed one of the largest DDoS attacks in recent history.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","width":1000,"height":667,"caption":"IoT Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/iot-devices-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Unsecured IoT Devices Behind Last Week&#8217;s DDoS Attack, More Likely to Come"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/62875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=62875"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/62875\/revisions"}],"predecessor-version":[{"id":219840,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/62875\/revisions\/219840"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/64078"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=62875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=62875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=62875"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=62875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}