{"id":78872,"date":"2017-09-25T07:35:08","date_gmt":"2017-09-25T14:35:08","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=78872"},"modified":"2025-08-26T00:44:11","modified_gmt":"2025-08-26T07:44:11","slug":"avril-lavigne-most-dangerous-celebrity","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/","title":{"rendered":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family"},"content":{"rendered":"<p>Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they know exactly where to plant malware links designed to steal personal information from our devices.<\/p>\n<p>Such is the case with Canadian pop-punk artist Avril Lavigne, who by no fault of her own, has landed in the #1 spot on the <a href=\"https:\/\/www.businesswire.com\/news\/home\/20170918006525\/en\/Avril-Lavigne-2017-McAfee-Dangerous-Celebrity%E2%84%A2\">McAfee Most Dangerous Celebrities\u2122 2017 study<\/a>. The public\u2019s love of music and obsession with the personal lives of the celebrities who make it is clear this year since, in fact, the top 10 list is solely comprised of artists (see graphic, above).<\/p>\n<p>The search habits that put Lavigne on the top of the list were two-fold: The first was a strange internet conspiracy theory claiming she\u2019s an imposter, and the second was the announcement that she planned to release a new album this year. Those two content searches skyrocketed the 32-year-old pop punk artist to the top slot for malicious links.<\/p>\n<p>So if we love our music and searching out everything about it, how do we spot those malicious links before it\u2019s too late? More importantly, how do we curb the fast-moving fingers of our kids who aren\u2019t about to quit their music obsession? Here are just a few tips to help your family feed its musical appetite and still hang on to its privacy.<\/p>\n<h2><strong>5 Safe Search Tips for Families:<\/strong><\/h2>\n<p><strong>Slow down.<\/strong> Having a world of information at our fingertips has spoiled us. We want the information we want <em>when we want it<\/em>. Crooks bank on the fact that we are moving fast and likely not taking the time to question a suspicious link. So slow down and think before you click and encourage your kids to do the same. If there\u2019s a trending conspiracy theory or a link to \u201cfree\u201d music, video files or even a downloadable screensaver these can be red flags that malicious links may be attached to the information.<\/p>\n<p><strong>Talk about it.<\/strong> Just as you\u2019d talk to your family about locking the doors and taking personal safety precautions, teach your kids to build up the same awareness online. Challenge them to be savvy about malicious links designed to siphon information and infect devices. Educate them about the consequences of malicious links such as identity theft, password hacking, financial theft, viruses, spyware, extortion, click fraud, and other forms of digital theft.<\/p>\n<p><strong>Go to the source. <\/strong>In many ways, you have to become an internet sleuth and be able to spot that sketchy third-party link. Looking for a specific music or video download? Your best bet is to always go to the source. Rather than risk getting duped by a third party site, wait for the official release of an album or song. Before you click any link: Examine the site. Look for flaws. Refuse to click on that third-party link that could get you in trouble \u2014 it\u2019s simply not worth it.<\/p>\n<p><strong>Be careful searching MP3s. <\/strong>The search \u201cAvril Lavigne + free mp3\u201d was by far the riskiest way to search for Avril Lavigne content and resulted in a risk percentage of nearly 22%. Searching the phrase \u201cfree MP3\u201d returned the highest number of risky websites, so be aware of this cyber trap and search carefully. If a site looks suspect, keep moving. Teach kids that very few things that are legitimate are also free online. There is an exchange going on and in the case of malware\u2014that transaction can be risky.<\/p>\n<p><strong>Browse with safeguards.<\/strong>\u00a0In a world where search is everything, safety becomes everything. Using a tool like <a href=\"https:\/\/mcafee.com\/mcafeewebadvisor\">McAfee WebAdvisor<\/a>\u00a0can help keep you safe by identifying malicious websites and warning the user before they click.<\/p>\n<p>As long as we are searching out the content we love, there will be cyber thugs searching for new and innovative ways to trap us into that wayward click. Advise your loved ones to just slow down and think before they click. It\u2019s still possible to enjoy the feast of excellent content online (especially music!) and keep your privacy intact.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Toni Birdsong is a <a href=\"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/\">Family Safety Evangelist<\/a> to <a title=\"McAfee\" href=\"https:\/\/home.mcafee.com\">McAfee<\/a>.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend&#8230;<\/p>\n","protected":false},"author":642,"featured_media":154078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"tags":[5193,5179,5189,1814,4452,142,5187,180,5190,5194,18,2205,5191,5192,4222,321,5188],"coauthors":[3359],"class_list":["post-78872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-family-safety","tag-celebrity","tag-click-farming","tag-click-fraud","tag-computer-security","tag-cybersecurity","tag-tag-identity-theft","tag-malicious-links","tag-malware","tag-most-dangerous-celebrity-study","tag-musician","tag-network-security","tag-protecting-kids-online","tag-safe-search","tag-search","tag-social-media","tag-social-networking","tag-spyware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-25T14:35:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T07:44:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/2017\/09\/MDC-2017-list-300x273.jpg\" \/>\n<meta name=\"author\" content=\"Toni Birdsong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Toni Birdsong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\"},\"author\":{\"name\":\"Toni Birdsong\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\"},\"headline\":\"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family\",\"datePublished\":\"2017-09-25T14:35:08+00:00\",\"dateModified\":\"2025-08-26T07:44:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg\",\"keywords\":[\"celebrity\",\"click farming\",\"click fraud\",\"computer security\",\"cybersecurity\",\"identity theft\",\"malicious links\",\"malware\",\"Most Dangerous Celebrity Study\",\"musician\",\"network security\",\"protecting kids online\",\"safe search\",\"search\",\"social media\",\"social networking\",\"spyware\"],\"articleSection\":[\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\",\"name\":\"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg\",\"datePublished\":\"2017-09-25T14:35:08+00:00\",\"dateModified\":\"2025-08-26T07:44:11+00:00\",\"description\":\"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg\",\"width\":1250,\"height\":675,\"caption\":\"family tech agreement\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Family Safety\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/family-safety\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\",\"name\":\"Toni Birdsong\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"caption\":\"Toni Birdsong\"},\"description\":\"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog","description":"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog","og_description":"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they","og_url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-09-25T14:35:08+00:00","article_modified_time":"2025-08-26T07:44:11+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/2017\/09\/MDC-2017-list-300x273.jpg","type":"","width":"","height":""}],"author":"Toni Birdsong","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Toni Birdsong","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/"},"author":{"name":"Toni Birdsong","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228"},"headline":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family","datePublished":"2017-09-25T14:35:08+00:00","dateModified":"2025-08-26T07:44:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg","keywords":["celebrity","click farming","click fraud","computer security","cybersecurity","identity theft","malicious links","malware","Most Dangerous Celebrity Study","musician","network security","protecting kids online","safe search","search","social media","social networking","spyware"],"articleSection":["Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/","url":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/","name":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg","datePublished":"2017-09-25T14:35:08+00:00","dateModified":"2025-08-26T07:44:11+00:00","description":"Like stockbrokers watch the market, cybercriminals keep an eye on the public\u2019s latest obsessions. And, once they spot a trend in our search behavior, they","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/1250x675_Blog_familytechagreement.jpg","width":1250,"height":675,"caption":"family tech agreement"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/family-safety\/avril-lavigne-most-dangerous-celebrity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Family Safety","item":"https:\/\/www.mcafee.com\/blogs\/family-safety\/"},{"@type":"ListItem","position":3,"name":"How Cyber Thugs Use Music and Celebrity Searches to Dupe Your Family"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228","name":"Toni Birdsong","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","caption":"Toni Birdsong"},"description":"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.","url":"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78872","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/642"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=78872"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78872\/revisions"}],"predecessor-version":[{"id":221095,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/78872\/revisions\/221095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/154078"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=78872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=78872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=78872"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=78872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}