{"id":65271,"date":"2016-11-15T06:00:47","date_gmt":"2016-11-15T14:00:47","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=65271"},"modified":"2025-08-06T07:59:44","modified_gmt":"2025-08-06T14:59:44","slug":"so-your-phone-is-hacked","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/","title":{"rendered":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do"},"content":{"rendered":"<p>Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep our sensitive data under wraps. Now imagine if a stranger had free access to, and total control of, your mobile device. All of your personal information, including contacts, emails, payment info, and passwords are exposed. That private information is the pot of gold that cybercriminals are always on the hunt for.<\/p>\n<p>Cybercriminals\u2019 strategies are <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/most-hackable-gifts-2016\/\" target=\"_blank\" rel=\"noopener\">constantly evolving<\/a>, and once a device is breached, it\u2019s in their hands. From playing online poker to going on shopping sprees <a href=\"http:\/\/www.forbes.com\/sites\/eliseackerman\/2012\/11\/18\/1113\/#45d965ed3afa\" target=\"_blank\" rel=\"noopener\">using your payment information<\/a>, the consequences of a hacked phone are more than annoying\u2014they\u2019re dangerous. <a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/soyourphoneishacked?path=blogs\">To keep your device secure<\/a>, it\u2019s important to know the signs of a breach, and how to prevent them in the future.<\/p>\n<h2><strong>How to Know If Your Mobile Device Has Been Hacked: <\/strong><\/h2>\n<ol>\n<li><strong><u>Unfamiliar Apps:<\/u><\/strong> When unfamiliar apps pop up on your phone or bizarre messages are sent to numbers in your address book, you may have fallen victim to a hack. Once hackers take control of your device, things will start to look out of order. Hackers often crack devices to load their malicious files, or to cipher personal data for their advantage, so don\u2019t just shrug it off when you see changes that you don\u2019t remember making.<\/li>\n<li><strong><u>Unexpected Gifts at Your Front Door<\/u><\/strong><u>:<\/u> Have you started receiving random packages at home or work? Hate to break it to you, but they\u2019re <em>probably<\/em> too good to be true (or you have a secret admirer). When hackers gain access to your phone, they most likely have access to all your payment information too. By keeping an eye on your credit card transactions and your mobile phone bill, you can detect early on if it looks like your payment information is at risk.<\/li>\n<li><strong><u>Feeling Hot, Hot, Hot:<\/u><\/strong> If your phone suddenly can\u2019t keep its charge, it\u2019s possible that malware is running in the background. You may know approximately how long it takes for your mobile device to die depending on the apps you\u2019ve got running. If you find it\u2019s dying quicker than ever before, it could be a red flag that an outsider has gained access. Similarly, a mobile device that runs hot could be infected with malware, since the program will constantly run in the background.<\/li>\n<\/ol>\n<h2><strong>How to Avoid Another Mobile Hack: <\/strong><strong>\u00a0<\/strong><\/h2>\n<ol>\n<li><strong><u>Run Mobile Anti-Virus Software<\/u>:<\/strong> Protect your device from the inside out with comprehensive security software. <a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/soyourphoneishacked?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a>, free for both\u00a0<a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/soyourphoneishacked?path=blogs\" target=\"_blank\" rel=\"noopener\">Android<\/a>\u00a0and\u00a0<a href=\"https:\/\/mmsmcafee.onelink.me\/mcafeefree\/soyourphoneishacked?path=blogs\" target=\"_blank\" rel=\"noopener\">iOS<\/a>, helps to protect your device and its data from hackers. Everyone loves fun apps, what\u2019s one more?<\/li>\n<li><strong><u>Be Careful About Browsing on Public Wi-Fi:<\/u><\/strong> Wi-Fi connections that promise fast, free internet can be easy bait for mobile phone users. We have all found ourselves desperate for internet access, but be choosy of networks. By accessing a compromised one, cybercriminals could also access your personal information.<\/li>\n<li><strong><u>Keep Your Phone Updated:<\/u><\/strong> Mobile operating systems are regularly updated to provide enhanced security built to defend against updated threats. It may feel like just another task, but the consequences of ignoring the update could ultimately be much more time-consuming than the half hour it takes for your mobile device to reboot.<\/li>\n<li><strong><u>Check Your Credit Card Statements Regularly:<\/u><\/strong> I know\u2014no one <em>enjoys<\/em> checking their credit card statements, but it\u2019s a fact of life that we just can\u2019t ignore. You\u2019ll be even more shocked if you receive your bill and it appears as though someone <em>else<\/em> had a shopping spree of their own. If you do see suspicious payments pop up on your credit card, cancel it immediately.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Humans are private by nature. We may share an inspiring article or photos from a fun trip, but we keep&#8230;<\/p>\n","protected":false},"author":674,"featured_media":129712,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,40,3946,32,214],"coauthors":[3973],"class_list":["post-65271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-apple","tag-credit-card-fraud","tag-data-protection","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do<\/title>\n<meta name=\"description\" content=\"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do\" \/>\n<meta property=\"og:description\" content=\"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-15T14:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T14:59:44+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do\",\"datePublished\":\"2016-11-15T14:00:47+00:00\",\"dateModified\":\"2025-08-06T14:59:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg\",\"keywords\":[\"android\",\"Apple\",\"credit card fraud\",\"data protection\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\",\"name\":\"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg\",\"datePublished\":\"2016-11-15T14:00:47+00:00\",\"dateModified\":\"2025-08-06T14:59:44+00:00\",\"description\":\"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg\",\"width\":614,\"height\":300,\"caption\":\"man looking at his hacked email\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do","description":"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do","og_description":"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-15T14:00:47+00:00","article_modified_time":"2025-08-06T14:59:44+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do","datePublished":"2016-11-15T14:00:47+00:00","dateModified":"2025-08-06T14:59:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg","keywords":["android","Apple","credit card fraud","data protection","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/","name":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg","datePublished":"2016-11-15T14:00:47+00:00","dateModified":"2025-08-06T14:59:44+00:00","description":"Once a phone is hacked, your payment information is in the cybercriminals hands. How to Know If Your Mobile Device Has Been Hacked:","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/05\/614x300_EmailHacked.jpg","width":614,"height":300,"caption":"man looking at his hacked email"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-your-phone-is-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"So You Think Your Phone Is Hacked\u2014Here\u2019s What to Do"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=65271"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65271\/revisions"}],"predecessor-version":[{"id":212213,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65271\/revisions\/212213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/129712"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=65271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=65271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=65271"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=65271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}