{"id":75435,"date":"2017-06-27T10:36:10","date_gmt":"2017-06-27T17:36:10","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=75435"},"modified":"2025-08-14T02:24:28","modified_gmt":"2025-08-14T09:24:28","slug":"petya-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/","title":{"rendered":"Petya is Here, And It\u2019s Taking Cues from WannaCry"},"content":{"rendered":"<p>Just over a month after the infamous\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/wannacry-ransomware-attacks\/?utm_content=blog&amp;utm_source=social&amp;utm_medium=blogembed\" target=\"_blank\" rel=\"noopener\">WannaCry attack<\/a>, a new worldwide\u00a0<a href=\"https:\/\/www.wired.com\/story\/petya-ransomware-outbreak-eternal-blue\" target=\"_blank\" rel=\"noopener\">cyberattack\u00a0<\/a>is here again. Its name is Petya, or Petwrap, it\u2019s hit companies everywhere across Europe, including\u00a0<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ukraine-businesses-petya-ransomware\/\" target=\"_blank\" rel=\"noopener\">Ukraine\u2019s government facilities<\/a>, electric grids, banks, and public transportation, demanding a $300 ransom in Bitcoin in the process.<\/p>\n<p>So how does this\u00a0<a href=\"https:\/\/www.theguardian.com\/world\/2017\/jun\/27\/petya-ransomware-attack-strikes-companies-across-europe\" target=\"_blank\" rel=\"noopener\">Petya attack<\/a>\u00a0work, exactly? Going after Windows servers, PCs, and laptops, this\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/06\/27\/ransomware-spreads-rapidly-hitting-power-companies-banks-airlines-metro\/#9f5ce657abd6\" target=\"_blank\" rel=\"noopener\">cyberattack<\/a>\u00a0appears to be an \u201cupdated variant\u201d of the Petya malware virus. It uses the SMB (Server Message Block) vulnerability that WannaCry did to spread to unpatched devices in combination with a credential-stealing technique to spread non-vulnerable machines as well. This attack then encrypts, among other files, your master boot file. These messages recommend you conduct a system reboot, after which the system is inaccessible. This basically means the operating system won\u2019t be able to locate files and, not to mention, there\u2019s no way to decrypt files.<\/p>\n<p>This makes Petya a wiper, instead of ransomware as it was first believed to be. And even though Petya demands a Bitcoin payment, these cybercriminals aren\u2019t really in this for the money. In fact, its more likely that this was aimed at either causing destruction, or conducting a test to see how far this attack can spread, as these crooks may be potentially preparing for a larger attack in the future.<\/p>\n<h2>Tips to Stay Protected<\/h2>\n<p>Now, the next question is \u2013 what can people do to stay secure? Though this attack is largely targeting companies, it\u2019s important everyone stays vigilant and takes precautionary measures. Therefore, to stay protected from Petya, follow these tips:<\/p>\n<p><strong>-Always make sure your anti-virus is up-to-date<\/strong>\u00a0to maximize the protection available to you.<\/p>\n<p><strong>-Don\u2019t click too quickly.<\/strong>\u00a0This attack may be spreading through\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=RCpNwRM-Wcc\" target=\"_blank\" rel=\"noopener\">phishing<\/a>\u00a0or spam emails, so make sure you check an email\u2019s content for legitimacy. Hover over a link and see if it\u2019s going to a reliable URL. Or, if you\u2019re unsure about an email\u2019s content or the source it came from, do a quick search and look for other instances of this campaign, and what those instances could tell you about the email\u2019s legitimacy.<\/p>\n<p><strong>-Do a complete back up.\u00a0<\/strong>Back up all of your machines immediately. If a machine becomes infected with Petya, data could become wiped entirely. Therefore, make sure you cover all your bases and have your data stored on an external hard drive or elsewhere.<\/p>\n<p><strong>-Apply system and application updates.<\/strong>\u00a0Make sure your operating system is up-to-date to help contain the spread of malware. Petya is spreading in organizations using the same technique as WannaCry, infecting systems that did not have up-to-date OS patches.<\/p>\n<p>We will update this post with breaking news.<\/p>\n<p>For more information on this attack, check out the\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/petya-effective-destruction-ransomware\/\" target=\"_blank\" rel=\"noopener\">blog from our research team<\/a>\u00a0on Petya or the\u00a0<a href=\"https:\/\/service.mcafee.com\/webcenter\/portal\/cp\/home\/articleview;jsessionid=vzHvcmDrHRMUokeRMFD788uTJk-RYz_EHWa_BwsUYMxTsXi_cNQi!1721074719!-1832861708?articleId=TS102703&amp;_afrLoop=4117450884939261#!%40%40%3F_afrLoop%3D4117450884939261%26articleId%3DTS102703%26centerWidth%3D100%2525%26leftWidth%3D0%2525%26rightWidth%3D0%2525%26showFooter%3Dfalse%26showHeader%3Dfalse%26_adf.ctrl-state%3D19q5ju9tpm_4\" target=\"_blank\" rel=\"noopener\">Knowledge Center<\/a>. And, of course, stay on top of the latest consumer and mobile security threats by following\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s&#8230;<\/p>\n","protected":false},"author":674,"featured_media":137446,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,13],"tags":[4452,5063,4549],"coauthors":[3973],"class_list":["post-75435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-petya","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-27T17:36:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T09:24:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Petya is Here, And It\u2019s Taking Cues from WannaCry\",\"datePublished\":\"2017-06-27T17:36:10+00:00\",\"dateModified\":\"2025-08-14T09:24:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\"},\"wordCount\":509,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp\",\"keywords\":[\"cybersecurity\",\"Petya\",\"ransomware\"],\"articleSection\":[\"Security News\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\",\"name\":\"Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp\",\"datePublished\":\"2017-06-27T17:36:10+00:00\",\"dateModified\":\"2025-08-14T09:24:28+00:00\",\"description\":\"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp\",\"width\":614,\"height\":300,\"caption\":\"ataques de ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Petya is Here, And It\u2019s Taking Cues from WannaCry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog","description":"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog","og_description":"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-06-27T17:36:10+00:00","article_modified_time":"2025-08-14T09:24:28+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Petya is Here, And It\u2019s Taking Cues from WannaCry","datePublished":"2017-06-27T17:36:10+00:00","dateModified":"2025-08-14T09:24:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/"},"wordCount":509,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp","keywords":["cybersecurity","Petya","ransomware"],"articleSection":["Security News","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/","name":"Petya is Here, And It\u2019s Taking Cues from WannaCry | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp","datePublished":"2017-06-27T17:36:10+00:00","dateModified":"2025-08-14T09:24:28+00:00","description":"Just over a month after the infamous\u00a0WannaCry attack, a new worldwide\u00a0cyberattack\u00a0is here again. Its name is Petya, or Petwrap, it\u2019s hit companies","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/614x300-ataques-de-ransomware.webp","width":614,"height":300,"caption":"ataques de ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/petya-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Petya is Here, And It\u2019s Taking Cues from WannaCry"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=75435"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75435\/revisions"}],"predecessor-version":[{"id":219704,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75435\/revisions\/219704"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/137446"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=75435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=75435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=75435"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=75435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}