{"id":76322,"date":"2017-07-25T06:00:52","date_gmt":"2017-07-25T13:00:52","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=76322"},"modified":"2025-08-05T09:57:24","modified_gmt":"2025-08-05T16:57:24","slug":"leaker-locker-mobile-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/","title":{"rendered":"Running from Ransomware: A Mobile User\u2019s Guide"},"content":{"rendered":"<p>From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy lunches, conquer the stack of unwashed dishes in the sink from the night before, and make sure that everyone is out the door on time. One day, in\u00a0 the midst of all the usual mania, I had a horrible realization that I had forgotten to buy my mom\u2019s birthday present.<\/p>\n<p>To save myself some time, I whipped out my phone, scrolled through the net and explored a few last-minute gift options. In the corner of my eye, I saw an ad for some cute shoes she\u2019d like from a retail site I had previously visited. Zoom, tap, bam! Browsing history comes through to help me find a present in the blink of an eye.<\/p>\n<p>Last-minute online shopping isn\u2019t the only thing our connected devices are good for. We rely on our mobile phones for the simplest things to navigate through our daily lives. From mapping directions, to scrolling through nearby restaurant reviews, to quickly scanning newsworthy articles, our devices accumulate a lot of personal data through our browsing history.<\/p>\n<p>Although browsing history has come handy for me in certain situations, it often gets a bad rap on its own. Leaker Locker, the new mobile <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/malware-5-tips-fighting-malicious-software\/?utm_content=blog&amp;utm_source=social&amp;utm_medium=blogembed\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a> <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/leakerlocker-mobile-ransomware-acts-without-encryption\/?utm_content=blog&amp;utm_source=social&amp;utm_medium=blogembed\" target=\"_blank\" rel=\"noopener noreferrer\">discovered by the McAfee team<\/a>, has created a browsing history nightmare by leveraging surfing habits against mobile users.<\/p>\n<p>When we\u2019re navigating through the net, we usually (often wrongfully) assume that our information will remain private. Unfortunately, that\u2019s not always the case. Our increased trust of the web and dependence on our connected devices has excited cybercriminals, causing the number of mobile malware threats to grow over <a href=\"http:\/\/www.ciodive.com\/news\/mcafee-4-new-cyberthreats-per-second-many-of-them-mobile-malware\/445452\/\" target=\"_blank\" rel=\"noopener noreferrer\">80% in the last year<\/a>.<\/p>\n<p>Hiding behind apps that can be found in the Google Play store, Leaker Locker harnesses its malicious <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware<\/a> by disguising itself as an unauthorized mobile backup. Present on <a href=\"http:\/\/www.zdnet.com\/article\/this-android-ransomware-threatens-to-expose-your-browsing-history-to-all-your-contacts\/\" target=\"_blank\" rel=\"noopener noreferrer\">two apps<\/a> on the Google Play store, this ransomware disguised as an app leaves the everyday consumer, like you and me, vulnerable.<\/p>\n<p>So how does Leaker Locker work? It attacks when the user allows device permissions to the newly downloaded, disguised app. Once the malicious app gains access to the device, the device is locked down, and a message pops up on-screen, announcing\u00a0 that the owner\u2019s sensitive information has been compromised. This private information is then used as a bargaining chip for a ransom.<\/p>\n<h2>Tips to Avoid Ransomware<\/h2>\n<p>Want to make sure you\u2019re not the next victim of this ransomware? Follow these tips:<\/p>\n<ul>\n<li><u>Attention, Please:<\/u> Scope out the app\u2019s listing on the app store, and read through its reviews carefully. Sure, an app might look like a fun game or seem to make your life convenient, but it pays to be <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/android-devices-compromised-judy-apps\/?utm_content=blog&amp;utm_source=social&amp;utm_medium=blogembed\" target=\"_blank\" rel=\"noopener noreferrer\">vigilant<\/a>. Many users leave helpful warnings to others about if a specific app has been disguised as a hub for ransomware. If the reviews or actual app listings seem fishy, steer clear.<\/li>\n<li><u>Don\u2019t Pay to Play:<\/u> Cybercriminals love to demand money in exchange for the \u201csafety\u201d of your personal data. Although <a href=\"https:\/\/qz.com\/986094\/wannacry-ransomware-attacks-victims-have-stopped-paying-the-ransom\/\" target=\"_blank\" rel=\"noopener noreferrer\">paying the ransom<\/a> seems like a good idea, don\u2019t fall for this trap! Paying the ransom doesn\u2019t guarantee the return of your information. Be extra cautious and try to keep sensitive data off your mobile device.<\/li>\n<li><u>Back It Up:<\/u> Back up your personal information and files by taking advantage of <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-security\/coachella-phone-theives\/?utm_content=blog&amp;utm_source=social&amp;utm_medium=blogembed\" target=\"_blank\" rel=\"noopener noreferrer\">both<\/a> an external hard drive and the cloud. In the event that you get locked out of your mobile device, you\u2019ll still have access to important data. This back up plan will give you a better peace of mind.<\/li>\n<\/ul>\n<p>Mobile ransomware has been making headlines, and cybercriminals don\u2019t plan on stopping anytime soon. Get educated and be familiar with their actions. To cover all of your bases, consider turning to a mobile security solution like McAfee Mobile Security (MMS) for <a href=\"http:\/\/app.appsflyer.com\/com.wsandroid.suite?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">Android<\/a><u>.<\/u> With newly designed features that allow you to browse more securely on mobile, MMS provides real time malware (ransomware included) detection capabilities. Most importantly, it gives you the power to safeguard against threats like Leaker Locker a single tap.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[214],"coauthors":[3973],"class_list":["post-76322","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog<\/title>\n<meta name=\"description\" content=\"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-25T13:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:57:24+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Running from Ransomware: A Mobile User\u2019s Guide\",\"datePublished\":\"2017-07-25T13:00:52+00:00\",\"dateModified\":\"2025-08-05T16:57:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\"},\"wordCount\":705,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"keywords\":[\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\",\"name\":\"Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"datePublished\":\"2017-07-25T13:00:52+00:00\",\"dateModified\":\"2025-08-05T16:57:24+00:00\",\"description\":\"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg\",\"width\":300,\"height\":200,\"caption\":\"laptop with a ransomware threat\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Running from Ransomware: A Mobile User\u2019s Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog","description":"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog","og_description":"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-07-25T13:00:52+00:00","article_modified_time":"2025-08-05T16:57:24+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Running from Ransomware: A Mobile User\u2019s Guide","datePublished":"2017-07-25T13:00:52+00:00","dateModified":"2025-08-05T16:57:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/"},"wordCount":705,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","keywords":["mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/","name":"Running from Ransomware: A Mobile User\u2019s Guide | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","datePublished":"2017-07-25T13:00:52+00:00","dateModified":"2025-08-05T16:57:24+00:00","description":"From the second my alarm goes off, my day goes 100 miles a minute. In addition to getting myself ready for work, I have to pack my kids some brag-worthy","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_5RansomwareThreats.jpg","width":300,"height":200,"caption":"laptop with a ransomware threat"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/leaker-locker-mobile-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Running from Ransomware: A Mobile User\u2019s Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/76322","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=76322"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/76322\/revisions"}],"predecessor-version":[{"id":214283,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/76322\/revisions\/214283"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125966"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=76322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=76322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=76322"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=76322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}