{"id":66837,"date":"2016-12-02T15:08:40","date_gmt":"2016-12-02T23:08:40","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=66837"},"modified":"2025-08-31T21:34:59","modified_gmt":"2025-09-01T04:34:59","slug":"unwanted-calendar-invitations","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/","title":{"rendered":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations"},"content":{"rendered":"<p>Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured \u201camazing savings\u201d and discounts on a variety of popular products. They were, of course, spam messages \u2014 akin to those you\u2019d find in an email inbox.<\/p>\n<p>But this \u201ccalendar spam\u201d is different than the usual phony email offer you\u2019d receive in your inbox. For one, users would suffer more invitations if they actively rejected an invitation. The reason for this is simple: rejecting an invitation lets the spammer know a user is actively monitoring a targeted account \u2014 a ripe target for more spam. What\u2019s worse, as <a href=\"http:\/\/www.nytimes.com\/2016\/11\/25\/technology\/personaltech\/fighting-ios-calendar-spam.html?_r=1\" target=\"_blank\" rel=\"noopener noreferrer\">The New York Times<\/a> reports, is the fact that putting an end to this deluge of spam requires multiple steps and some knowledge of cloud accounts and permissions. This, likely, won\u2019t be the last time we see new spamming techniques.<\/p>\n<p>Welcome to the new and improved version of spam, where abusers get instant feedback from targets and targets get unceasing invitations to a variety of hoaxes via email, on social media and, now, in their calendars. This evolution has been <a href=\"https:\/\/www.wired.com\/2010\/09\/pr_burningquestion_spam\/\" target=\"_blank\" rel=\"noopener noreferrer\">long in the making<\/a>. Let\u2019s take a quick look at why.<\/p>\n<p>Spammers know that, in most cases, email filters are advanced enough to detect and remove scams from a victim\u2019s inbox. The days of copying and blast-emailing from lists on the Dark Web, for the most part, are over. Instead of sending emails, spammers are using two tools to better advertise their illicit goods: social media and built-in connectivity tools.<\/p>\n<p>Spam has a strong presence on social media. Creating a fake account, whether on Facebook or Twitter, is fairly easy. Actors can then use a variety of social engineering techniques to either sucker users into spreading fake news or deals, or simply compromise an account. If successful, these attacks can be difficult to stop. A compromised account can help spammers directly relay illicit messages through chat and messenger applications. Users tricked into spreading fake content, either by liking or messaging, can make a similar impact. Regardless, both techniques are troublesome, as the illicit content spreads from trusted friends or family.<\/p>\n<p>But social media spamming is detectable and therefore blockable. Artificial intelligence can filter out quick-to-spread spam posts. As <a href=\"http:\/\/thenextweb.com\/future-of-communications\/2015\/04\/06\/5-types-of-social-spam-and-how-to-prevent-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Next Web notes<\/a>, verification methods, such as requiring new users to enter a code sent over text messages, can cut down on the number of fake accounts a spammer can create.<\/p>\n<p>This, likely, has pushed spammers to exploit built-in connectivity tools. Built-in connectivity tools are small programs allowing users to easily connect through an off-site server like iCloud. If you back your photos up to the cloud, sync calendar invitations through the internet or use a similar service, you use built-in connectivity tools. By abusing these tools, spammers leveraged a new method of reaching victims.<\/p>\n<p>In this case, according to MacWorld, abusers exploited an email-related feature on iCloud, allowing the spam invitations to be set as recurring events that would repeatedly surface. Users would unwittingly exacerbate this problem by rejecting invitations, alerting spammers that eyes were on their messages and could, potentially, be tricked into accepting a phony invitation.<\/p>\n<h2>What to Do When You Encounter These Messages<\/h2>\n<p>As of now, Apple is actively working on a fix for this exploit. Of course, it is not the only organization that will need to do so \u2014 built-in connectivity tools are becoming increasingly common and susceptible to exploits. So what should you do if you encounter one of these messages? How can you block these messages while still accepting legitimate invitations?<\/p>\n<p>The solutions can be a bit involved. You can find guides from <a href=\"http:\/\/gizmodo.com\/how-to-stop-icloud-calendar-spam-1789430890\" target=\"_blank\" rel=\"noopener noreferrer\">Gizmodo here<\/a>, <a href=\"http:\/\/arstechnica.com\/information-technology\/2016\/11\/how-to-stop-the-wave-of-apple-calendar-alert-spam\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica here<\/a> and<a href=\"https:\/\/9to5mac.com\/2016\/11\/09\/icloud-photo-sharing-and-calendar-spam\/\" target=\"_blank\" rel=\"noopener noreferrer\"> 9-to-5 Mac here<\/a>. But the elements to blocking calendar spam is simply this:<\/p>\n<ul>\n<li><strong>Do not interact with the notice.<\/strong> Accepting, rejecting or actively considering a spam invitation is an invitation for more spam. If you see one of these messages in your calendar, do not interact with it in any way.<\/li>\n<li><strong>Log into iCloud, and turn off in-app notifications.<\/strong> Go to icloud.com and log into your Apple ID account on a desktop or laptop computer. Find the calendar web application, and click on the \u201cSettings\u201d gear icon located in the lower left corner of the screen. Click on \u201cPreferences\u201d and then the \u201cAdvanced\u201d icon at the top of the pop-up screen. Under the \u201cInvitations\u201d section, select \u201cEmail to\u201d and save. Congratulations, you\u2019ll have blocked this attack method.<\/li>\n<\/ul>\n<p>To block the bad invitations, but keep receiving the legitimate, do this:<\/p>\n<ul>\n<li><strong>Create a fake calendar in the Calendar application<\/strong>. Open your Calendar application on any device and create a new calendar (you can do this by going to the \u201cEdit\u201d tab or tapping on the \u201cEdit\u201d button on your device). Create a new calendar and label it as \u201cspam filter,\u201d or something similar.<\/li>\n<li><strong>Open Spam invitations.<\/strong> Go to the spam invitations in your Calendar application and change the invitation\u2019s \u201ccategory.\u201d You can do this by either tapping on the invitation and looking for the \u201cCalendar\u201d tab underneath the invite, or for the color-coded category button located next the invitation\u2019s title. Select the calendar you just created.<\/li>\n<li><strong>Delete \u201cSpam\u201d Calendar.<\/strong> Now for the best part: go to \u201cEdit\u201d and click or press on \u201cDelete.\u201d You should, in theory, be free of spam invitations, as this method doesn\u2019t let the spammer know if you\u2019ve accepted or declined the invitation. If you do receive more spam invites, simply repeat the steps above or turn off your iCloud Calendar invitation entirely.<\/li>\n<\/ul>\n<p>And that\u2019s that. This likely isn\u2019t going to be the end of this spamming method. As always, there are a few tips you should keep in mind:<\/p>\n<ul>\n<li><strong>Never accept invitations or offers from strangers online.<\/strong> For one, accepting them encourages them to send you more. For another, they can link to malicious websites built to load your computer or device with <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malicious software<\/a>. Either ignore them or delete them.<\/li>\n<li><strong>Great deals are often too good to be true. <\/strong>Special deals just for you often are not. In fact, they could very likely be hoax in disguise. Remember the old adage: if it\u2019s too good to be true, it probably is.<\/li>\n<li><strong>Always have some form of security on your devices. <\/strong>As a matter of insurance and protection, it pays to have a comprehensive security solution, like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a> on all of your devices. Comprehensive security solutions can help block malicious websites, monitor your devices for malware and generally keep you safe online.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Sometime in November, Apple users began receiving unwanted calendar invitations on their devices. These invitations featured \u201camazing savings\u201d and discounts&#8230;<\/p>\n","protected":false},"author":674,"featured_media":209177,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[40,1814,4452],"coauthors":[3973],"class_list":["post-66837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-apple","tag-computer-security","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-02T23:08:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T04:34:59+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations\",\"datePublished\":\"2016-12-02T23:08:40+00:00\",\"dateModified\":\"2025-09-01T04:34:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\"},\"wordCount\":1099,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png\",\"keywords\":[\"Apple\",\"computer security\",\"cybersecurity\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\",\"name\":\"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png\",\"datePublished\":\"2016-12-02T23:08:40+00:00\",\"dateModified\":\"2025-09-01T04:34:59+00:00\",\"description\":\"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png\",\"width\":1228,\"height\":600,\"caption\":\"man reading phishing emails\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog","description":"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog","og_description":"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-12-02T23:08:40+00:00","article_modified_time":"2025-09-01T04:34:59+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations","datePublished":"2016-12-02T23:08:40+00:00","dateModified":"2025-09-01T04:34:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/"},"wordCount":1099,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png","keywords":["Apple","computer security","cybersecurity"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/","name":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png","datePublished":"2016-12-02T23:08:40+00:00","dateModified":"2025-09-01T04:34:59+00:00","description":"Sometime in November, Apple users began receiving unwanted calendar invitations on their devices","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/614x300_Blog_Avoid-Phishing-Emails.png","width":1228,"height":600,"caption":"man reading phishing emails"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/unwanted-calendar-invitations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Why You\u2019re Going to Have to Start Filtering Your Calendar Invitations"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=66837"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66837\/revisions"}],"predecessor-version":[{"id":221854,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/66837\/revisions\/221854"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/209177"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=66837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=66837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=66837"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=66837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}