{"id":78038,"date":"2017-09-13T10:39:04","date_gmt":"2017-09-13T17:39:04","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=78038"},"modified":"2025-08-31T19:46:29","modified_gmt":"2025-09-01T02:46:29","slug":"blueborne-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/","title":{"rendered":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices"},"content":{"rendered":"<p>From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data wirelessly, Bluetooth technology is widely popular, and has been implemented into billions of devices. Therefore, <a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/09\/bluetooth-bugs-open-billions-of-devices-to-attacks-no-clicking-required\/\" target=\"_blank\" rel=\"noopener\">the discovery<\/a> of BlueBorne, a vulnerability found in some Bluetooth technology, which cybercriminals can use to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices\/\" target=\"_blank\" rel=\"noopener\">infect<\/a> these popular devices, is not exactly music to our ears.<\/p>\n<p>In fact, there are four zero-day BlueBorne vulnerabilities that have been found in the Bluetooth implementations used by over 5.3 billion devices. These vulnerabilities endanger major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. The BlueBorne name itself is indication of how the attack works, as it spread through the air (airborne) and attacks devices via Bluetooth.<\/p>\n<p>So what exactly do these vulnerabilities permit cybercriminals to do? Specifically, they allow attackers to take over devices and execute malicious code, or run man-in-the-middle attacks and potentially intercept data shared via Bluetooth communications. What\u2019s more &#8212; the vulnerabilities can be made into a self-spreading Bluetooth worm.<\/p>\n<h2>Security Tips<\/h2>\n<p>Therefore, it\u2019s important users everywhere start thinking about protection. First and foremost, you should check and see if your personal devices will be impacted by these vulnerabilities. And if your devices are included in those listed, be sure to follow these additional security tips:<\/p>\n<ul>\n<li><strong>Turn Bluetooth off unless you have to use it.<\/strong> Affected software providers have been notified of these vulnerabilities and are working on fixing them as we speak. But in the meantime, it\u2019s crucial you turn off your Bluetooth unless you absolutely must use it. To do this on iOS devices, simply go to your \u201cSettings\u201d, select \u201cBluetooth\u201d and toggle it from on to off. On Android devices, open the &#8220;Settings&#8221; app and the app will display a &#8220;Bluetooth&#8221; toggle button under the &#8220;Wireless and networks&#8221; subheading that you can use to enable and\u00a0disable the feature.<\/li>\n<li><strong>Update your software immediately.<\/strong> It\u2019s an important security rule of thumb: always update your software whenever an update is available, as security patches are usually included with each new version. Regarding the BlueBorne vulnerabilities specifically &#8212; all iPhone, iPad and iPod touch devices with iOS 9.3.5 and lower, and AppleTV devices with version 7.2.2 and lower are affected, but the issue was patched in iOS 10. Microsoft has also stated they patched the vulnerabilities back in July. However, if you\u2019re not an iOS or Windows user, fear not \u2013 security patches for additional providers are on their way.<\/li>\n<li><strong>Install comprehensive security.<\/strong> After you\u2019ve updated your devices with the latest software, be sure to install comprehensive security. A solution like\u00a0<a href=\"https:\/\/home.mcafee.com\/root\/landingpage.aspx?lpname=mls_info&amp;affid=0&amp;culture=en-us&amp;lqmcat=Social:Blog:WW:Blog:11042013:GaryRR:internal&amp;cid=132126\" target=\"_blank\" rel=\"noopener\">McAfee LiveSafe<\/a>\u00a0can ensure your devices are protected from cybercriminals wishing to leverage the BlueBorne vulnerabilities in order to steal your personal data.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it&#8230;<\/p>\n","protected":false},"author":674,"featured_media":217336,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[214,4827],"coauthors":[3973],"class_list":["post-78038","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-mobile-security1","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog<\/title>\n<meta name=\"description\" content=\"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-13T17:39:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T02:46:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices\",\"datePublished\":\"2017-09-13T17:39:04+00:00\",\"dateModified\":\"2025-09-01T02:46:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"keywords\":[\"mobile security\",\"vulnerability\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\",\"name\":\"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"datePublished\":\"2017-09-13T17:39:04+00:00\",\"dateModified\":\"2025-09-01T02:46:29+00:00\",\"description\":\"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg\",\"width\":614,\"height\":409,\"caption\":\"Convert PDF files with online programs. Users convert document files on a platform using an internet connection at desks. concept of technology transforms documents into portable document formats.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog","description":"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog","og_description":"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-09-13T17:39:04+00:00","article_modified_time":"2025-09-01T02:46:29+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices","datePublished":"2017-09-13T17:39:04+00:00","dateModified":"2025-09-01T02:46:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/"},"wordCount":498,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","keywords":["mobile security","vulnerability"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/","name":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","datePublished":"2017-09-13T17:39:04+00:00","dateModified":"2025-09-01T02:46:29+00:00","description":"From headsets, to speakers \u2013 Bluetooth technology has become an integral part our devices, and our everyday lives. Since it allows users to exchange data","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/08\/shutterstock_2371217063-1.jpg","width":614,"height":409,"caption":"Convert PDF files with online programs. Users convert document files on a platform using an internet connection at desks. concept of technology transforms documents into portable document formats."},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/blueborne-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"BlueBorne Vulnerabilities Endanger Over 5 Billion Bluetooth-Enabled Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=78038"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78038\/revisions"}],"predecessor-version":[{"id":221789,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78038\/revisions\/221789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/217336"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=78038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=78038"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=78038"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=78038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}