{"id":74599,"date":"2017-05-31T10:12:26","date_gmt":"2017-05-31T17:12:26","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=74599"},"modified":"2025-08-19T09:14:40","modified_gmt":"2025-08-19T16:14:40","slug":"android-devices-compromised-judy-apps","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/","title":{"rendered":"Android Devices Potentially Compromised by Judy App Weaknesses"},"content":{"rendered":"<p>We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/wannacry-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">WannaCry ransomware attack<\/a> left quite a few in tears. Now, we have Judy, a set of insecure gaming apps, which are aptly named after their \u201ccutesy\u201d main character. And though these 41 Android apps are characterized by the sweet avatar, the security complications they carry are anything but cute.<\/p>\n<p>These Judy apps are poorly designed, which has created security gaps and makes them subject to abuse. Leveraging this lack of security, cybercriminals can manipulate the apps to auto-click on banners from Google ads, which generates revenue for the crooks behind the scheme.<\/p>\n<h2>Tips to Protect Yourself from Risky Apps<\/h2>\n<p>So now the question is \u2013 how do mobile users stay safe? First off, it\u2019s important for developers to create apps with security in mind. Regardless, Google has removed all of the Judy apps, which came from Korean developer Kiniwini, from the Google Play store. But remember that these apps are also available on iOS as well. So, all mobile users need to make sure they\u2019re on the lookout. Therefore, in order to protect yourself from risky apps, such as the Judy apps, follow these tips:<\/p>\n<p><strong>-Do your homework.<\/strong> Before you even download an app, make sure you head to the reviews section of an app store first. Take the time to sift through the reviews, and keep an eye out for ones that mention that the app has had issues with security or might be a bit sketchy. When in doubt, don\u2019t download any app that is remotely questionable.<\/p>\n<p><strong>-Keep apps up-to-date.<\/strong> The developer behind the Judy applications will soon likely include a security patch in the latest updates for their apps. Therefore, as a good practice, whenever updates are available for any of your applications, make sure to install them immediately.<\/p>\n<p><strong>-Use a mobile security solution.\u00a0<\/strong>As risky apps continue to persist in both Google\u2019s and Apple\u2019s official app stores, make sure your mobile devices are prepared for any threat coming their way. To do just that, cover these devices with a mobile security solution, such as <a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Mobile Security<\/a>.<\/p>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43386 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a&#8230;<\/p>\n","protected":false},"author":674,"featured_media":130552,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,1838],"tags":[37,4322],"coauthors":[3973],"class_list":["post-74599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-mobile-security","tag-android","tag-app-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog<\/title>\n<meta name=\"description\" content=\"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-31T17:12:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T16:14:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Android Devices Potentially Compromised by Judy App Weaknesses\",\"datePublished\":\"2017-05-31T17:12:26+00:00\",\"dateModified\":\"2025-08-19T16:14:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\"},\"wordCount\":394,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg\",\"keywords\":[\"android\",\"app security\"],\"articleSection\":[\"Security News\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\",\"name\":\"Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg\",\"datePublished\":\"2017-05-31T17:12:26+00:00\",\"dateModified\":\"2025-08-19T16:14:40+00:00\",\"description\":\"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg\",\"width\":614,\"height\":300,\"caption\":\"woman playing android games\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Android Devices Potentially Compromised by Judy App Weaknesses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog","description":"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog","og_description":"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-05-31T17:12:26+00:00","article_modified_time":"2025-08-19T16:14:40+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Android Devices Potentially Compromised by Judy App Weaknesses","datePublished":"2017-05-31T17:12:26+00:00","dateModified":"2025-08-19T16:14:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/"},"wordCount":394,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg","keywords":["android","app security"],"articleSection":["Security News","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/","name":"Android Devices Potentially Compromised by Judy App Weaknesses | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg","datePublished":"2017-05-31T17:12:26+00:00","dateModified":"2025-08-19T16:14:40+00:00","description":"We\u2019ve seen cyberattacks truly embody their names as of late, given how the massive WannaCry ransomware attack left quite a few in tears. Now, we have","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_AndroidGaming.jpg","width":614,"height":300,"caption":"woman playing android games"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-devices-compromised-judy-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Android Devices Potentially Compromised by Judy App Weaknesses"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=74599"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74599\/revisions"}],"predecessor-version":[{"id":220611,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/74599\/revisions\/220611"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/130552"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=74599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=74599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=74599"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=74599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}