{"id":70762,"date":"2017-03-28T06:00:54","date_gmt":"2017-03-28T13:00:54","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=70762"},"modified":"2025-08-26T20:19:03","modified_gmt":"2025-08-27T03:19:03","slug":"cloudpets-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/","title":{"rendered":"These Cute Teddy Bears Have Been Recording Your Kids"},"content":{"rendered":"<p>When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might think of enterprises and large organizations as victims of cyberattacks, but actors are moving their target to the home. Living with three kids, I try to make my home\u2013\u2013and my tech\u2013\u2013as safe for my kids as possible.<\/p>\n<p>Cybercriminals are tricky, however, and sometimes sneak in to our homes in ways we\u2019d never imagine possible. Recent attacks are even targeting children\u2019s toys that connect to the internet, putting not only you, but your children\u2019s privacy at risk.<\/p>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/leemathews\/2017\/02\/28\/cloudpets-data-leak-is-a-privacy-nightmare-for-parents-and-kids\/#1b559101b0bf\" target=\"_blank\" rel=\"noopener\">CloudPets<\/a> are loveable plush toys that allow kids to communicate directly with loved ones from afar. Friends and family members from around the globe can record voice messages on the CloudPets mobile app and upload it to a child\u2019s stuffed animal, which will then play it for the owner. Kids can respond back by recording their own message through the stuffed animal\u2019s built-in recording mechanism.<\/p>\n<p>Security expert Troy Hunt was <a href=\"https:\/\/www.troyhunt.com\/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages\/\" target=\"_blank\" rel=\"noopener\">contacted<\/a> last month by an unknown source, who told Hunt they had access to the entire CloudPets database of passwords and recordings. The source sent a snippet of about half a million recordings to Hunt, who then began to work on verifying their authenticity. He had been leading a security course at the time, and one of his students in the class was registered as a CloudPets parent. Using his student\u2019s information, Hunt was able to locate his student\u2019s email in the database, match the passwords, and authenticate the data. The leaked information included audio recordings of both children and adult voices with direct links, as well as the account profile photos of the kids who possessed the toys.<\/p>\n<h2>How to Stay Safe With Your IoT Devices at Home<\/h2>\n<p>So, what does this mean for our children and their security? While this leak wasn\u2019t as bad as <a href=\"https:\/\/www.nytimes.com\/2015\/12\/01\/business\/security-breach-at-toy-maker-vtech-includes-data-on-children.html?_r=0\" target=\"_blank\" rel=\"noopener\">the VTech breach<\/a> that occurred a few years back, it\u2019s still unclear how many people accessed the data that was exposed by this vulnerability. Because CloudPets didn\u2019t have any complexity requirements for account passwords, it means it\u2019s <em>that<\/em> much more vital to teach our children the importance of creating secure, complex logins. As the industry learns from attacks and fights back, there are a few proactive steps you\u2013\u2013and your kids\u2013\u2013can take. For now, know these three \u201cS\u2019s\u201d to make your family more secure while using IoT devices at home.<\/p>\n<ul>\n<li><strong><u>Secure<\/u>:<\/strong> How do you manage the passwords you use to protect your online accounts? You may only have one or two passwords for all online services you\u2019re registered for (<a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/simplify-security-password-algorithm\/\" target=\"_blank\" rel=\"noopener\">studies show<\/a> that most of us use between 15 and 20 accounts each, but some of use 100 or more). This means that if one account is breached, all other accounts are at risk. Instead of relying on your brain to be your password manager, create your own algorithm to constructing secure passwords, and use a password manager like the True Key app, which keeps track of your logins, creates strong passwords, and signs you in with biometric security\u2014just make sure each account has a unique password, and that you <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/world-password-day-2016\/\" target=\"_blank\" rel=\"noopener\">update your passwords<\/a> regularly!<\/li>\n<li><strong><u>Separate<\/u>:<\/strong> Connecting your devices to <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/connected-life\/\" target=\"_blank\" rel=\"noopener\">separate networks<\/a> creates <a href=\"http:\/\/lifehacker.com\/5791208\/run-your-home-network-like-a-coffee-shop\" target=\"_blank\" rel=\"noopener\">distinct connections<\/a> and minimizes opportunity for a hack. We recommend using at least three different networks: one for your personal laptops, smartphones and tablets; one for guests\u2019 devices; and one for IoT devices. This way, should a smart device become compromised, the breach will be limited to other devices connected to that network, and protect your personal devices from a threat. Smart Home products <a href=\"http:\/\/www.mediapost.com\/publications\/article\/275080\/smart-home-products-moving-to-50-of-households-by.html\" target=\"_blank\" rel=\"noopener\">will exist<\/a> in 50% of households by 2020, so it\u2019s vital that we lock down our devices now as threats become smarter.<\/li>\n<li><strong><u>Safeguard<\/u>:<\/strong> Invest in an internet router that protects your devices from within the system. <a href=\"http:\/\/www.pcmag.com\/news\/350846\/mcafee-security-now-comes-in-a-wi-fi-router\" target=\"_blank\" rel=\"noopener\">McAfee Secure Home Platform<\/a> does just that, securing internet-connected devices through the connection itself, to ensure maximum security. McAfee Secure Home Platform will be available on the Arris Surfboard Gateway and Humax routers in retailers across the US, Germany, and Thailand soon. Keep an eye out this Spring for gateways that have the McAfee Secure Home Platform built-in.<\/li>\n<\/ul>\n<p>From improving personal safety, to increasing the ease of day-to-day tasks, IoT devices and smart home technology make your home and life more efficient. By remembering these easy tips to ensure IoT device safety and staying vigilant of suspicious behavior, you can get the most out of connected devices with the peace of mind that your data isn\u2019t up for grabs.<\/p>\n<p>Looking for more mobile security tips and trends? Be sure to follow\u00a0<a href=\"http:\/\/www.twitter.com\/mcafee_home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter and like us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-68611 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-128x128.jpg 128w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected&#8230;<\/p>\n","protected":false},"author":674,"featured_media":99334,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838,12],"tags":[3949,4131,3952,4295,4847],"coauthors":[3973],"class_list":["post-70762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","category-family-safety","tag-cybersafety","tag-internet-of-things","tag-internet-security","tag-mobile","tag-smart-home"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog<\/title>\n<meta name=\"description\" content=\"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-28T13:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-27T03:19:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"These Cute Teddy Bears Have Been Recording Your Kids\",\"datePublished\":\"2017-03-28T13:00:54+00:00\",\"dateModified\":\"2025-08-27T03:19:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\"},\"wordCount\":802,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png\",\"keywords\":[\"cybersafety\",\"Internet of Things\",\"internet security\",\"mobile\",\"smart home\"],\"articleSection\":[\"Mobile Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\",\"name\":\"These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png\",\"datePublished\":\"2017-03-28T13:00:54+00:00\",\"dateModified\":\"2025-08-27T03:19:03+00:00\",\"description\":\"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png\",\"width\":1200,\"height\":627,\"caption\":\"protecting kids online\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Family Safety\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"These Cute Teddy Bears Have Been Recording Your Kids\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog","description":"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog","og_description":"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might","og_url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-03-28T13:00:54+00:00","article_modified_time":"2025-08-27T03:19:03+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"These Cute Teddy Bears Have Been Recording Your Kids","datePublished":"2017-03-28T13:00:54+00:00","dateModified":"2025-08-27T03:19:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/"},"wordCount":802,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png","keywords":["cybersafety","Internet of Things","internet security","mobile","smart home"],"articleSection":["Mobile Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/","name":"These Cute Teddy Bears Have Been Recording Your Kids | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png","datePublished":"2017-03-28T13:00:54+00:00","dateModified":"2025-08-27T03:19:03+00:00","description":"When we think of cyberhacks, we often think of criminals trying to break into a network of important information protected behind a screen. You might","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/shutterstock_731774509.png","width":1200,"height":627,"caption":"protecting kids online"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/cloudpets-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Family Safety","item":"https:\/\/www.mcafee.com\/blogs\/family-safety\/"},{"@type":"ListItem","position":3,"name":"These Cute Teddy Bears Have Been Recording Your Kids"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=70762"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70762\/revisions"}],"predecessor-version":[{"id":221162,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/70762\/revisions\/221162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/99334"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=70762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=70762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=70762"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=70762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}