{"id":70607,"date":"2017-03-22T12:22:06","date_gmt":"2017-03-22T19:22:06","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=70607"},"modified":"2025-08-14T07:14:53","modified_gmt":"2025-08-14T14:14:53","slug":"cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/","title":{"rendered":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks"},"content":{"rendered":"<p>In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added functionality like search, bookmark management, local weather forecast and more in an easy to access area of the browser. All-in-all, they were harmless, albeit annoying. That is no longer the case. Ask.com, purveyor of the somewhat well-known Ask.com toolbar, has fallen victim to two very specific and targeted attacks.<\/p>\n<p>The first attack, according to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ask-com-toolbar-network-compromised-twice-in-two-months\/\" target=\"_blank\" rel=\"noopener noreferrer\">BleepingComputer.com<\/a>, took place at the end of October. Third-party security vendors detected the attack and alerted the toolbar\u2019s creator, Ask Partner Network (APN). APN quickly flushed the intruders out of their network, but only temporarily. The cybercriminals returned in December, specifically re-infecting the Ask.com toolbar with potentially unwanted programs.<\/p>\n<p>So why are these small, innocuous and <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/february-2015-threats-report\/\" target=\"_blank\" rel=\"noopener noreferrer\">potentially unwanted programs<\/a> (PUPs) bad for end users? Simple: they offer cybercriminals more opportunities to compromise networks and users. They, in the parlance of the cybersecurity industry, expand the attack surface for hackers.<\/p>\n<p>The cybercriminals responsible for this attack managed to compromise APN\u2019s network at least twice. By doing so, they were able to take advantage of the company\u2019s digital certificates\u2014essentially little strips of code proving APN is who they say they are\u2014to push malicious updates to end users. These strips of code essentially act as an I.D. card for companies, allowing them to issue trusted, verified updates for their programs to end users.<\/p>\n<p>Compromised digital certificates <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/adobe-flash-scareware\/\" target=\"_blank\" rel=\"noopener noreferrer\">can cause a lot of damage<\/a>. In this case, cybercriminals used the certificates to trick end users into updating their Ask.com toolbar. By doing so, they unknowingly downloaded a corrupted file that enabled the attackers to both unpack a Remote Access Tool\/Trojan (<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/identity-protection\/what-is-rat\/\" target=\"_blank\" rel=\"noopener noreferrer\">RAT<\/a>) and steal credentials that would allow them to target other computers on the network.<\/p>\n<p>The good news here is that the attack appears to be highly manual in nature. The security report even details typos in the attacker\u2019s code, and suggests that a human\u2014not an automated bot\u2014may be issuing the attack in real-time. This means the attack is slow-moving and unlikely to hit a lot of users at once, giving security firms the time they need to detect the attack. This does not, however, mean it\u2019s impossible for crooks to pull off.<\/p>\n<h2>Tips to Protect Your Devices<\/h2>\n<p>To head off this potential exploit and protect your devices, follow these tips:<\/p>\n<ul>\n<li><strong>Watch what you install.<\/strong> There are a lot of programs out there that are available for downloading. Do yourself a favor and limit yourself. While most programs are safe, some can pose problems. Only download programs from trusted app stores or directly from developers you trust.<\/li>\n<\/ul>\n<ul>\n<li><strong>Stay up to date with updates.<\/strong> Installing updates when they\u2019re available is one of the most sure-fire ways of staying safe online today. Yes, this attack occurred with a bad update, but attacks like this are extremely rare. Install updates when they\u2019re available to ensure the latest security patches are in place.<\/li>\n<\/ul>\n<ul>\n<li><strong>Use comprehensive security.<\/strong> Comprehensive security solutions are key to living a safe digital lifestyle. Security suites, like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-livesafe.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee LiveSafe\u2122<\/a>, can help protect your devices with the latest, up-to-date security technology, and are essential to cross-device security today.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by <a href=\"http:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">following me<\/a> and <a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a> on Twitter, and &#8216;Like&#8217; us on <a href=\"http:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of&#8230;<\/p>\n","protected":false},"author":674,"featured_media":208627,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,13],"tags":[3952,180],"coauthors":[3973],"class_list":["post-70607","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-privacy-identity-protection","tag-internet-security","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog<\/title>\n<meta name=\"description\" content=\"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-22T19:22:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T14:14:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks\",\"datePublished\":\"2017-03-22T19:22:06+00:00\",\"dateModified\":\"2025-08-14T14:14:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\"},\"wordCount\":586,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg\",\"keywords\":[\"internet security\",\"malware\"],\"articleSection\":[\"Security News\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\",\"name\":\"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg\",\"datePublished\":\"2017-03-22T19:22:06+00:00\",\"dateModified\":\"2025-08-14T14:14:53+00:00\",\"description\":\"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg\",\"width\":1100,\"height\":733,\"caption\":\"woman checking her data on her laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog","description":"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog","og_description":"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-03-22T19:22:06+00:00","article_modified_time":"2025-08-14T14:14:53+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks","datePublished":"2017-03-22T19:22:06+00:00","dateModified":"2025-08-14T14:14:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/"},"wordCount":586,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg","keywords":["internet security","malware"],"articleSection":["Security News","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/","name":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg","datePublished":"2017-03-22T19:22:06+00:00","dateModified":"2025-08-14T14:14:53+00:00","description":"In the late 90s and early 2000s, most web browsers came with small, add-on programs to enhance browsing. Most of these programs were toolbars, which added","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/pexels-vlada-karpovich-4050290.jpg","width":1100,"height":733,"caption":"woman checking her data on her laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/cybercriminals-learn-love-extensions-like-toolbars-recent-targeted-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Cybercriminals Learn to Love Extensions like Toolbars in Targeted Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70607","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=70607"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70607\/revisions"}],"predecessor-version":[{"id":219762,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70607\/revisions\/219762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/208627"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=70607"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=70607"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=70607"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=70607"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}