{"id":65313,"date":"2016-11-20T21:01:42","date_gmt":"2016-11-21T05:01:42","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=65313"},"modified":"2025-08-15T02:44:06","modified_gmt":"2025-08-15T09:44:06","slug":"most-hackable-gifts-2016","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/","title":{"rendered":"The Holiday Season is Here, Spreading Hackable Gifts Wide and Near"},"content":{"rendered":"<p>It\u2019s the most wonderful time of the year, but I\u2019m feeling anxious \u2014 security anxious, that is. Every year, we see a new round of electronic gadgets to gift during the holidays\u2014and even indulge in ourselves. But more often than not, especially today, those tech-driven gifts requires an internet connection to work. And any internet connection has the potential to be vulnerable to cybercriminals without the proper security precautions.<\/p>\n<p>That\u2019s why we\u2019re releasing our second-annual McAfee Most Hackable Holiday Gifts list: to remind you that smart gadgets are at risk of cybersecurity shenanigans, and most importantly, how to protect them.<\/p>\n<p>Most users know older technology like laptops, phones and desktops have vulnerabilities cybercriminals could exploit. But what they don\u2019t know is that many devices that aren\u2019t explicitly computers are also connected to the internet. That means they are just as vulnerable.<\/p>\n<p>Web cameras, connected toys, fitness trackers and more need to be secured. If they\u2019re not, holiday shoppers could find themselves unwitting participants in large-scale attacks, like previous widespread attacks on <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/fisher-price-toy-vulnerability\/\" target=\"_blank\" rel=\"noopener\">children\u2019s toys<\/a> and other family-loved technology. According to our survey, most people (81 percent) think it\u2019s important that their online identity and internet-connected devices are secure this holiday season, but nearly half (47 percent) are unsure if they are taking the right security measures.<\/p>\n<p>Here\u2019s the breakdown of the most hackable holiday gifts this year:<\/p>\n<h2><strong>Laptops and PCs<\/strong><\/h2>\n<p>Big-ticket gifts like laptops and PCs are always popular items. They\u2019re also always at the top of the list for cybercriminals to crack. Securing these devices isn\u2019t difficult, though. Just make sure you activate security applications as part of the initial startup of your brand new device, and ensure you keep the software up to date.<\/p>\n<p><strong>Smartphones and Tablets <\/strong><\/p>\n<p>According to our survey, 52 percent of users plan to purchase either a smartphone or tablet this holiday shopping season. Much like their laptop and desktop brethren, these devices are vulnerable to malware and need to be protected, as well. Here, good passwords and good security practices, such as installing a security application like McAfee Mobile Security, avoiding suspicious third-party applications, and using a PIN to lock your device can help.<\/p>\n<h2><strong>Media Players and Streaming Sticks <\/strong><\/h2>\n<p>Media players and streaming sticks are a new, growing product category. They hook into just about any television and provide an easy and convenient way to watch shows, movies and more. But the security of these devices do need to be maintained. They need to be updated regularly and, if the option is available, protected by complex passwords. Fortunately, many device manufactures push automatic updates directly to these devices, but you can do a manual check depending on device and its manufacturer.<\/p>\n<h2><strong>Smart Home Automation Devices and Applications<\/strong><\/h2>\n<p>The Internet of Things (IoT), a family of devices that connect to the internet and in turn connect to each other, is a wonderful category to go to when finding a gift for a friend or family member this year. However, they are often times the most vulnerable of the holiday gift-giving bunch. Some devices have weak security standards. Others lack any security standards at all.<\/p>\n<p>If you\u2019re considering a gift under the \u201cIoT\u201d umbrella, then do your research. Make sure you\u2019re aware of the security standards your device has. Read online reviews for the connected gadgets you are considering, and that you\u2019re aware of any security shortcomings you may encounter. After all, cybercriminals have found many ways to trick smartlocks, thermostats and more to use these devices in distributed denial of service attacks like <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot-devices-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">the attack that took down many popular websites<\/a>.<\/p>\n<h2><strong>Drones<\/strong><\/h2>\n<p>Finally, perhaps the hottest-ticket item of the year: drones. In fact, drone sales are expected to grow to more than $20 billion by 2020. They offer the ability to capture amazing videos, intriguing sights and are useful tools to get eyes where it\u2019s hard to see. However, they still need to be secured. Again, using a complex password at least eight characters long with random numbers, letters and symbols is necessary for safe operation.<\/p>\n<p>Regardless of what you purchase (or receive) there are a few tips and tricks to keep in mind to make sure everyone has a safe season:<\/p>\n<ol>\n<li><strong>Change default passwords, and do an update right away. <\/strong>If you receive a connected gift, change the default password first and foremost. Default manufacturer passwords are rather easy for criminals to crack. Also, your device\u2019s software will need to be updated at some point. In a lot of cases, devices will have updates waiting from them as soon as they\u2019re taken out of the box. The first time you power up your device, you should check to see if there are any updates or patches from the manufacturer in order to ensure you\u2019re protected from the latest threats.<\/li>\n<li><strong>Secure your Wi-Fi. <\/strong>Any smart device will need a Wi-Fi connection to work. In order to protect what\u2019s yours, make sure you take the time to set your Wi-Fi up with a complex password. And remember: avoid public Wi-Fi if you can\u2014it\u2019s often insecure, and vulnerable to penetration by bad actors.<\/li>\n<li><strong>Use strong passwords, and strong PINs. <\/strong>Strong passwords are critical to any internet-connected device today. Make them count. Take the time to set up a robust password that\u2019s at least eight characters long and includes uppercase letters, lowercase letters, numbers and symbols. They also need to be unique to each device and each service. Password managers are useful tools that can help generate, and keep track of, complex passwords across all your digital accounts.<\/li>\n<\/ol>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a> and <a href=\"http:\/\/www.twitter.com\/McAfee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a> on Twitter, and &#8216;Like&#8217; us on <a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-43387\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s the most wonderful time of the year, but I\u2019m feeling anxious \u2014 security anxious, that is. Every year, we&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[1814,3949,4452,142],"coauthors":[3973],"class_list":["post-65313","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-computer-security","tag-cybersafety","tag-cybersecurity","tag-tag-identity-theft"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee&#039;s Most Hackable Gifts of 2016<\/title>\n<meta name=\"description\" content=\"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee&#039;s Most Hackable Gifts of 2016\" \/>\n<meta property=\"og:description\" content=\"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-21T05:01:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-15T09:44:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Holiday Season is Here, Spreading Hackable Gifts Wide and Near\",\"datePublished\":\"2016-11-21T05:01:42+00:00\",\"dateModified\":\"2025-08-15T09:44:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\"},\"wordCount\":975,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"keywords\":[\"computer security\",\"cybersafety\",\"cybersecurity\",\"identity theft\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\",\"name\":\"McAfee's Most Hackable Gifts of 2016\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"datePublished\":\"2016-11-21T05:01:42+00:00\",\"dateModified\":\"2025-08-15T09:44:06+00:00\",\"description\":\"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"width\":2048,\"height\":1360,\"caption\":\"smart gifts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Holiday Season is Here, Spreading Hackable Gifts Wide and Near\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee's Most Hackable Gifts of 2016","description":"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee's Most Hackable Gifts of 2016","og_description":"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-21T05:01:42+00:00","article_modified_time":"2025-08-15T09:44:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Holiday Season is Here, Spreading Hackable Gifts Wide and Near","datePublished":"2016-11-21T05:01:42+00:00","dateModified":"2025-08-15T09:44:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/"},"wordCount":975,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","keywords":["computer security","cybersafety","cybersecurity","identity theft"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/","name":"McAfee's Most Hackable Gifts of 2016","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","datePublished":"2016-11-21T05:01:42+00:00","dateModified":"2025-08-15T09:44:06+00:00","description":"We\u2019re releasing our Most Hackable Gifts list to remind you that smart gadgets are at risk of cybersecurity shenanigans, and how to protect them.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","width":2048,"height":1360,"caption":"smart gifts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The Holiday Season is Here, Spreading Hackable Gifts Wide and Near"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=65313"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65313\/revisions"}],"predecessor-version":[{"id":219835,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/65313\/revisions\/219835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93242"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=65313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=65313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=65313"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=65313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}