{"id":69590,"date":"2023-03-01T16:29:07","date_gmt":"2023-03-02T00:29:07","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=69590"},"modified":"2024-04-11T09:30:09","modified_gmt":"2024-04-11T16:30:09","slug":"malware-5-tips-fighting-malicious-software","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/","title":{"rendered":"How To Prevent Downloading Malicious Software"},"content":{"rendered":"<p>Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our lives. From an entire attack campaign on <a href=\"http:\/\/www.pcworld.com\/article\/3169413\/security\/recent-malware-attacks-on-polish-banks-tied-to-wider-hacking-campaign.html\" target=\"_blank\" rel=\"noopener\">banks worldwide,<\/a> to a strain residing <a href=\"http:\/\/www.darkreading.com\/endpoint\/medjack3-poses-advanced-threat-to-hospital-devices\/d\/d-id\/1328172\" target=\"_blank\" rel=\"noopener\">within medical devices<\/a>, to a variant that has learned to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/researchers-discover-self-healing-malware-that-targets-magento-stores\/\" target=\"_blank\" rel=\"noopener\">self-heal<\/a>, the list of malware-based attacks goes on. And as they do, it\u2019s becoming more and more clear that today\u2019s malware has not only become adaptive, but has learned how to spread its wings further than before, to devices beyond laptops and phones, and in a way that creates a longevity behind each cyberattack it spearheads.<\/p>\n<p>However, though it is important to understand the many forms that malware, or malicious software,\u00a0takes, it\u2019s crucial to first and foremost grasp what it is.<\/p>\n<h2><strong>What is Malware?<\/strong><\/h2>\n<p>The abbreviated term for malicious software, \u201cmalware,\u201d is a generic term used to describe any type of software or code specifically designed to exploit a computer\/mobile device or the data it contains, without consent. Most malware is designed to have some financial gain for the cybercriminal, as crooks typically use it to extract data that they can leverage over victims. That information can range anywhere from financial data, to healthcare records, to personal emails and passwords\u2014the possibilities of what sort of information can be compromised have become endless.<\/p>\n<h2><strong>How Malware Spreads<\/strong><\/h2>\n<p>So how exactly can these cybercriminals get their hands on so much data? Since its birth over 30 years ago, malware has found a variety of vessels to help it enact attacks. This includes email attachments, malicious advertisements on popular sites (malvertising), fake software installations, USB drives, infected apps, phishing emails, and even text messages.<\/p>\n<h2><strong>Types of Malware <\/strong><\/h2>\n<p>Now, these are just a few of the ways malicious software can be delivered\u2013but there are also different kinds of malware itself. To name a few:<\/p>\n<ul>\n<li><strong>Viruses.<\/strong> Almost always attached in a file, this malware variant usually comes as a document in an email that holds a virus payload (the part of malware that performs the malicious action). Once the victim opens the file, boom\u2014infected.<\/li>\n<\/ul>\n<ul>\n<li><strong>Worms.<\/strong> This malware strain doesn\u2019t require user interaction or even a file to attack. Instead, worms have the ability to copy themselves from machine to machine, usually by exploiting some sort of security weakness in a software or operating system.<\/li>\n<\/ul>\n<ul>\n<li><strong>Trojans.<\/strong> This type of malware is the most commonly leveraged by cybercriminals, as of late. Trojans masquerade as harmless applications (for example, those you\u2019d use on your phone), tricking users into downloading and using them. Once up and running, they then can steal personal data, crash a device, spy on the someone\u2019s activities, or even launch a DDoS attack.<\/li>\n<\/ul>\n<ul>\n<li><strong>Ransomware.<\/strong> One of the most profitable, and therefore one of the most popular, of malware types amongst cybercriminals is ransomware. This variant simply installs itself onto a victim\u2019s machine, encrypts their files, and then turns around and demands a ransom (usually in Bitcoin) to return that data to the user.<\/li>\n<\/ul>\n<h2><strong>How You Can Fight Back <\/strong><\/h2>\n<p>Now that you know what malware is, how it can be delivered, and the many forms it takes, it\u2019s time to learn how you can <a href=\"https:\/\/www.mcafee.com\/en-us\/products\/mcafee-plus-ultimate.html?path=blogs\" target=\"_blank\" rel=\"noopener\">protect yourself<\/a> against it:<\/p>\n<ul>\n<li><strong>Keep your operating system and applications updated<\/strong>. Cybercriminals look for vulnerabilities in old or outdated software to capitalize on, so make sure you install updates as soon as they become available since they can close security holes that may have been exposed.<\/li>\n<\/ul>\n<ul>\n<li><strong>Avoid clicking on unknown links. <\/strong>Whether it comes via email, a social networking site, or a text message, if a link seems unfamiliar, keep away from it. This especially goes for links that come from someone you don\u2019t know.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be selective about which sites you visit. <\/strong>Do your best to only use known and trusted sites, as well as using comprehensive security packages such as\u00a0 <a href=\"https:\/\/www.mcafee.com\/en-us\/products\/mcafee-plus-ultimate.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee Ultimate<\/a>, to avoid any sites that may in fact be malicious without your knowing.\u00a0<strong>\u00a0<\/strong><\/li>\n<\/ul>\n<ul>\n<li><strong>Same goes for what apps you download<\/strong>. When looking for your next favorite app, make sure you only download something that checks out. Read app reviews, utilize only official app stores, and if something comes off as remotely fishy, steer clear.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be alert<\/strong>. Cybercriminals depend on laziness and inattentiveness\u2013so prove them wrong. Don\u2019t believe manipulative emails, don\u2019t leave your computer unattended, and most importantly, stay educated on the kinds of malware that could come your way.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":164947,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661,13],"tags":[4452,32,180],"coauthors":[15735],"class_list":["post-69590","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-data-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Prevent Downloading Malicious Software | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Prevent Downloading Malicious Software | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-02T00:29:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-11T16:30:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How To Prevent Downloading Malicious Software\",\"datePublished\":\"2023-03-02T00:29:07+00:00\",\"dateModified\":\"2024-04-11T16:30:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png\",\"keywords\":[\"cybersecurity\",\"data protection\",\"malware\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\",\"name\":\"How To Prevent Downloading Malicious Software | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png\",\"datePublished\":\"2023-03-02T00:29:07+00:00\",\"dateModified\":\"2024-04-11T16:30:09+00:00\",\"description\":\"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Malware: 5 Tips for Fighting the Malicious Software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Prevent Downloading Malicious Software | McAfee Blog","description":"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How To Prevent Downloading Malicious Software | McAfee Blog","og_description":"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-03-02T00:29:07+00:00","article_modified_time":"2024-04-11T16:30:09+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png","type":"image\/png"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How To Prevent Downloading Malicious Software","datePublished":"2023-03-02T00:29:07+00:00","dateModified":"2024-04-11T16:30:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/"},"wordCount":755,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png","keywords":["cybersecurity","data protection","malware"],"articleSection":["How To Guides and Tutorials","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/","name":"How To Prevent Downloading Malicious Software | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png","datePublished":"2023-03-02T00:29:07+00:00","dateModified":"2024-04-11T16:30:09+00:00","description":"Malware\u2014the term seems to be at the center of the news every day, with each headline telling of a new way the cyber threat has inserted itself into our","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/02\/300x200_Blog_021923.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/malware-5-tips-fighting-malicious-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"Malware: 5 Tips for Fighting the Malicious Software"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69590","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=69590"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69590\/revisions"}],"predecessor-version":[{"id":188680,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/69590\/revisions\/188680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/164947"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=69590"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=69590"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=69590"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=69590"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}