{"id":66717,"date":"2016-11-30T06:00:57","date_gmt":"2016-11-30T14:00:57","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=66717"},"modified":"2025-08-19T09:23:55","modified_gmt":"2025-08-19T16:23:55","slug":"2017-threat-predictions","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/","title":{"rendered":"From the Cloud to Drones: Threat Predictions for 2017"},"content":{"rendered":"<p><u><\/u><u><\/u>2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have continued to grow in size and impact throughout the past 12 months. And unfortunately, it looks like there\u2019s no sign of slowing. With McAfee Labs releasing their <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-predictions-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">2017 Threats Predictions Report<\/a>, we got to take a look into the future, as they envisioned which threats would increase (specifically around <a href=\"https:\/\/searchcloudcomputing.techtarget.com\/definition\/cloud-computing\" target=\"_blank\" rel=\"noopener noreferrer\">the cloud<\/a> and <a href=\"https:\/\/internetofthingsagenda.techtarget.com\/definition\/Internet-of-Things-IoT\" target=\"_blank\" rel=\"noopener noreferrer\">IoT<\/a>), which were on the horizon (like \u201c<a href=\"https:\/\/wordspy.com\/index.php?word=dronejacking\" target=\"_blank\" rel=\"noopener noreferrer\">dronejacking<\/a>\u201d), and what will be needed to stop them.<\/p>\n<p>Let\u2019s start with the cloud. The cloud has been a puzzling problem for cybersecurity experts since its inception, and unfortunately, its security is predicted to worsen. In 2017, more and more people are predicted to put faith in storing data in the cloud. This only puts a larger target on the cloud\u2019s back, as cybercriminals will be more than ready to take advantage of outdated authentication systems and explore new attack vectors.<\/p>\n<p>Why will the cloud be an easy \u201cin\u201d for crooks? For starters, users are expected to mismanage their cloud storage systems in 2017. Attackers\u2014mostly those looking to get a hefty paycheck\u2014will take advantage of user carelessness to speedily and anonymously steal large amounts of sensitive data. They may even start initiating \u201cDenial of service for ransom\u201d attacks as well. In this scenario, they\u2019d overload cloud systems with activity so that they shut down\u2014then demand a ransom from the victim to turn their access back on.<\/p>\n<p>Now, where does IoT fall in the new <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-threats-predictions-2017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Threats Predictions Report<\/a>? Well, the opportunities to steal data, deny operations, or cause damage using IoT will be broad, with the <a href=\"https:\/\/internetofthingsagenda.techtarget.com\/definition\/control-network\" target=\"_blank\" rel=\"noopener noreferrer\">hubs that manage<\/a> IoT devices coming in as the prime targets. When it comes to type of attack, ransomware is predicted to be the biggest threat to IoT. Overall, one thing is for certain: IoT is going to bring user privacy closer to its demise in 2017.<\/p>\n<p>Beyond their more traditional attack methods, such as manipulating IoT devices, cybercriminals are predicted to get more creative with the types of malware they\u2019re delivering, as well as what software and devices they\u2019re attempting to compromise. For instance, mobile phones will be faced with more ransomware attempts, and entire app markets could feel the heat of compromise.<\/p>\n<p>Now here\u2019s a new one: <a href=\"https:\/\/whatis.techtarget.com\/definition\/machine-learning\" target=\"_blank\" rel=\"noopener noreferrer\">machine learning<\/a>\u2014artificial intelligence enabling computer programs to teach themselves to grow when exposed to new data\u2014has recently been used by cybersecurity researchers to fight threats. But that too will soon change, with cybercriminals preparing to use machine learning to elevate their own attacks. Specifically, that means more <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a>, and more cleverly computed phishing attacks.<\/p>\n<p>Across all threats McAfee Labs predicts for 2017, what stands out most to me is a growth in \u201cdronejacking.\u201d Drones have recently boomed in popularity, and not just for the Average Joe: they\u2019re now used by law enforcement, farmers, and the media alike. And that\u2019s exactly why they\u2019re so enticing to cybercriminals \u2013 they\u2019re now completely omnipresent. If a crook gets ahold of one\u2014and it isn\u2019t hard for them to\u2014the hacking possibilities are endless. McAfee Labs\u2019 new report even foresees drone exploit toolkits soon finding their way into the deep corners of <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/what-the-dark-web-is\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Dark Web<\/a>.<\/p>\n<p>Will word of all these evolving and emerging threats, you may be asking yourself what must be done to prepare for these attacks. For the cloud, providers will have to improve the security of authentication systems. For IoT, service providers and device manufacturers alike need to enhance privacy settings on gadgets, develop top-notch user authentication for users to even access them, and build strong security right into the device hardware. And for drones, device security standards as well as usage restrictions need to be put in place. Some good news? The US Federal Aviation Administration is scrambling to put rules into effect as we speak, which govern when and where commercial drones can fly.<\/p>\n<h2>Security Tips<\/h2>\n<p>And to personally prepare yourself for the threats emerging in 2017, here are a few security tips that you can follow:<\/p>\n<ul>\n<li><strong>Don\u2019t trust the cloud with everything. <\/strong>With cloud vulnerabilities about, it\u2019s better to be safe than sorry. Avoid putting all of your sensitive data in cloud storage, and look to external hard drives to stow away your most private information.<\/li>\n<li><strong>Do your due diligence around device security standards. <\/strong>Fan of IoT gadgets, or drones? Great. Just remember to do your research, and look into devices\u2019 security standards, before buying. A fun, new gadget that doesn\u2019t have stringent security in place just isn\u2019t worth a potential hack.<\/li>\n<li><strong>Use a comprehensive security solution. <\/strong>If there\u2019s one thing for certain about coming threats in 2017, it\u2019s that they\u2019re coming from all directions. Therefore, you need to protect all points of attack, on all of your devices. Be sure to install a comprehensive security solution, such as <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe<\/a>.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"https:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">following me<\/a>\u00a0and<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>2016 has been quite the year. From widespread IoT attacks, to ransomware campaigns that extract millions of dollars, cyberthreats have&#8230;<\/p>\n","protected":false},"author":674,"featured_media":51973,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,8050],"tags":[4139,4131,214,18],"coauthors":[3973],"class_list":["post-66717","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-mcafee-news","tag-annual-threats-predictions","tag-internet-of-things","tag-mobile-security1","tag-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-30T14:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T16:23:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Screen-Shot-2016-11-29-at-3.34.38-PM-984x1024.png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"From the Cloud to Drones: Threat Predictions for 2017\",\"datePublished\":\"2016-11-30T14:00:57+00:00\",\"dateModified\":\"2025-08-19T16:23:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\"},\"wordCount\":855,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg\",\"keywords\":[\"Annual Threats Predictions\",\"Internet of Things\",\"mobile security\",\"network security\"],\"articleSection\":[\"Security News\",\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\",\"name\":\"From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg\",\"datePublished\":\"2016-11-30T14:00:57+00:00\",\"dateModified\":\"2025-08-19T16:23:55+00:00\",\"description\":\"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg\",\"width\":880,\"height\":660,\"caption\":\"danger drone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From the Cloud to Drones: Threat Predictions for 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog","description":"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog","og_description":"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-11-30T14:00:57+00:00","article_modified_time":"2025-08-19T16:23:55+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Screen-Shot-2016-11-29-at-3.34.38-PM-984x1024.png","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"From the Cloud to Drones: Threat Predictions for 2017","datePublished":"2016-11-30T14:00:57+00:00","dateModified":"2025-08-19T16:23:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/"},"wordCount":855,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg","keywords":["Annual Threats Predictions","Internet of Things","mobile security","network security"],"articleSection":["Security News","Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/","name":"From the Cloud to Drones: Threat Predictions for 2017 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg","datePublished":"2016-11-30T14:00:57+00:00","dateModified":"2025-08-19T16:23:55+00:00","description":"With McAfee Labs releasing their 2017 Threats Predictions Report, we take a look into the future and envision which threats will increase.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/danger-drone.jpg","width":880,"height":660,"caption":"danger drone"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/2017-threat-predictions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"From the Cloud to Drones: Threat Predictions for 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=66717"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66717\/revisions"}],"predecessor-version":[{"id":220635,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66717\/revisions\/220635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/51973"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=66717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=66717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=66717"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=66717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}