{"id":67097,"date":"2016-12-14T08:58:47","date_gmt":"2016-12-14T16:58:47","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=67097"},"modified":"2025-08-14T07:41:10","modified_gmt":"2025-08-14T14:41:10","slug":"popcorn-time-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/","title":{"rendered":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>The 2002 horror film, <em>The Ring<\/em>, had an interesting play on its genre: socialize the scares \u2014 at least in the confines of the movie. The plot was simple: if you view a cursed VHS tape, you\u2019re doomed to die unless you can pass it onto an unwitting victim. That victim must, in turn, pass it onto another victim. If they don\u2019t, they die. You get the point.<\/p>\n<p>Unfortunately, a group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims, who each pay the ransom of one bitcoin ($772 USD), to earn a chance at recovering their encrypted data, according to <a href=\"https:\/\/www.theguardian.com\/technology\/2016\/dec\/12\/new-ransomware-victims-popcorn-time-malware\" target=\"_blank\" rel=\"noopener\">The Guardian<\/a>. Alternatively, victims can pay one bitcoin to recover their encrypted files. Regardless what the victim chooses, the cybercriminals get something they want and the victim\u2019s data gets to\u2014possibly\u2014go on living.<\/p>\n<p>While the ransomware itself is still in development, it signals an unwelcome tactic capable of complicating ransomware defense. After all, Popcorn Time has a better chance at successfully infecting a targeted computer if a victim chooses to spread the malicious program on their own accord. They are, essentially, participating in the cybercriminal\u2019s phishing attack\u2014a technique that tricks victims into either giving up sensitive information or downloading malicious programs based on authority and trust. It should be noted that propagating malware for the purposes of recovering your own data is, according to <a href=\"http:\/\/siliconangle.com\/blog\/2016\/12\/11\/newly-discovered-ransomware-lets-users-off-infect-friends\/\" target=\"_blank\" rel=\"noopener\">Silicon Angle<\/a>, illegal.<\/p>\n<p>Ransomware is a particularly pernicious type of malicious program, as well. It encrypts the data on a victim\u2019s computer and holds the decryption key hostage until the victim pays the ransom in an allotted amount of time. If the victim doesn\u2019t pay in the desired timeframe \u2014 typically two to three days \u2014 then, usually, the cybercriminal deletes the decryption key, essentially forever locking a user out of their own device. Still, even if the victim does pay the ransom there\u2019s no guarantee the cybercriminal will actually deliver the decryption key. And, even if the key is delivered, there\u2019s still a chance the victim\u2019s device can be re-infected with another strain of ransomware.<\/p>\n<h2>Tips to Stop the Spread of Ransomware<\/h2>\n<p>So, what can you do to stop the spread of ransomware? Well, here are a few tips:<\/p>\n<ul>\n<li><strong>Keep your devices up to date. <\/strong>Ransomware can infect a variety of devices, including smartphones, desktops, laptops and tablets. Usually, these malicious programs depend on a known vulnerability for silent infection. Software updates often fix these vulnerabilities, reducing the chance ransomware has to cause damage. This holds true for other malware variants as well. In fact, one of the best methods for protecting your device is to update its software early and often. So don\u2019t hesitate to secure your device if you see an update is available.<\/li>\n<\/ul>\n<ul>\n<li><strong>Back up your data. <\/strong>Regular backups can help recover your devices\u2019 data from ransomware infections. They do so by restoring a \u201cclean state\u201d of your internal hard drive. However, there are<a href=\"http:\/\/www.pcworld.com\/article\/3056907\/security\/how-to-stop-ransomware-backup-can-protect-you-but-only-if-you-do-it-right.html\" target=\"_blank\" rel=\"noopener\"> some precautions<\/a> you need to take in order to ensure your backups aren\u2019t infected with ransomware as well, since many ransomware instances do infect backups. These precautions are simple: if you use a cloud-based (internet-based) backup service, make sure that service provides you with multiple backups or \u201cfile versioning\u201d \u2014 which preserves clean states of files. If you use an external hard drive to back up your devices, then make sure it is only connected to them during the backup process. A continuous connection could infect an external hard drive.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security software. <\/strong>Finally, use a comprehensive security suite designed to actively protect all of your devices. Solutions like <a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe\u2122<\/a> are regularly updated to scan your devices for the latest security risks (including ransomware) and flag suspicious websites. By using a comprehensive security solution, you\u2019re investing in a secure ecosystem for your digital life, and protecting your personal data in turn.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">following me<\/a> and <a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0on Twitter, and &#8216;Like&#8217; us on <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; The 2002 horror film, The Ring, had an interesting play on its genre: socialize the scares \u2014 at least&#8230;<\/p>\n","protected":false},"author":674,"featured_media":38708,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[1814,32,180],"coauthors":[3973],"class_list":["post-67097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-computer-security","tag-data-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-14T16:58:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T14:41:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up\",\"datePublished\":\"2016-12-14T16:58:47+00:00\",\"dateModified\":\"2025-08-14T14:41:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\"},\"wordCount\":711,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg\",\"keywords\":[\"computer security\",\"data protection\",\"malware\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\",\"name\":\"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg\",\"datePublished\":\"2016-12-14T16:58:47+00:00\",\"dateModified\":\"2025-08-14T14:41:10+00:00\",\"description\":\"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg\",\"width\":1020,\"height\":688},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog","description":"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog","og_description":"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-12-14T16:58:47+00:00","article_modified_time":"2025-08-14T14:41:10+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up","datePublished":"2016-12-14T16:58:47+00:00","dateModified":"2025-08-14T14:41:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/"},"wordCount":711,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg","keywords":["computer security","data protection","malware"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/","name":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg","datePublished":"2016-12-14T16:58:47+00:00","dateModified":"2025-08-14T14:41:10+00:00","description":"A group of cybercriminals have decided to emulate this plot via a ransomware program called \u201cPopcorn Time.\u201d Its premise is simple: if a victim is infected with the Popcorn Time malware, then they must infect two other victims.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/cash-atm-money_large_verge_super_wide.jpg","width":1020,"height":688},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/popcorn-time-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Ransomware Authors Intend to Give Victims a Choice: Infect Friends or Pay Up"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=67097"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67097\/revisions"}],"predecessor-version":[{"id":219775,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67097\/revisions\/219775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/38708"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=67097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=67097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=67097"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=67097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}