{"id":79968,"date":"2017-10-12T09:00:23","date_gmt":"2017-10-12T16:00:23","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=79968"},"modified":"2025-08-01T01:18:59","modified_gmt":"2025-08-01T08:18:59","slug":"5-tips-avoiding-android-malware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/","title":{"rendered":"5 Tips for Avoiding Android Malware"},"content":{"rendered":"<p>The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal information without us realizing it by distributing risky apps that we often willingly download.<\/p>\n<p>Many of the most dangerous apps target Android devices, and there are a few good reasons why. Let\u2019s look at why Android malware is so prevalent, and what you can do to keep your device and information safe.<\/p>\n<p>One reason why Android devices are a goldmine for cybercrooks is that they offer hundreds of millions of potential targets. Android is the most popular mobile operating system in the world, accounting for more than 80% of new smartphones sold in the last quarter of 2016<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a>.<\/p>\n<p>That\u2019s why just a handful of malicious apps can do serious damage. Take the \u201cExpensiveWall\u201d malware attack earlier this year, which spread to as many as 21 million victims. By sneaking malicious apps into the Google Play store, cybercriminals were able to charge users serious money for phony services and premium text messages they didn\u2019t agree to receive.<\/p>\n<p>The users thought they were downloading harmless apps offering wallpaper options and camera tools, not realizing that they were designed to rack up charges in the background. And since the apps were distributed through Google\u2019s official app store, users presumably thought they were safe.<\/p>\n<p>That leads us to another reason why Android malware is so popular with the bad guys. It is easier to get an app into the Google Play store, after a short manual review, compared to Apple\u2019s vetting process.\u00a0This wide distribution is great for Android users who want a large number of app choices that they can run on different devices without restrictions, but not so great when it comes to making sure that each app is above board and secure.<\/p>\n<p>For approval of an iOS app, or even an app update, developers have to submit to a rigorous review that can take as long as 10 days before the app is made available to the public. What\u2019s more, iOS apps are only distributed through Apple\u2019s official App Store, unlike Android apps, which are available through a number of channels. However, it&#8217;s important to note that iOS devices can be affected by the same tactics used against Android devices. For instance, both are occasionally subject to scareware attacks, which typically come in the form of deceptive\u00a0pop-ups.<\/p>\n<p>So, if you are an Android user it\u2019s worth your while to take a few key steps to avoid malware attacks aimed at accessing your device, money, and information.<\/p>\n<h2><strong>Here are 5 tips to stay safe:<\/strong><\/h2>\n<p>1) <strong>Do your own safety checks<\/strong>\u2014Before installing a new app, read other users\u2019 reviews to see if the app is safe and does what it claims to do. Be extra wary of \u201cfree apps\u201d distributed through little known sites, or via links sent by email or text message.<\/p>\n<p>2) <strong>Read the permissions first<\/strong>\u2014We know\u2014wading through all the legalese that comes with app permissions can be tiresome, but it is well worth your while. Make sure that the app won\u2019t invade your privacy by accessing information it doesn\u2019t need, like your contacts, camera, or keystrokes. Pay special attention to any mention of paid services, like premium text messages, so you know what you are agreeing to.<\/p>\n<p>3) <strong>Limit your install options<\/strong>\u2014Stick to using the official Google Play store or a reputable store like the Amazon App Store. (Although using the Play or Amazon stores is no guarantee that all the apps there are safe, they tend to have more users and more reviews to base your decisions on.)<\/p>\n<p>One quick and easy way to avoid unsafe apps is to make sure that the \u201cinstall from unknown sources\u201d setting remains in the off position. This prevents you from installing applications from anywhere other than the Play store.<\/p>\n<p>4) <strong>Limit your app use\u2014<\/strong>Only install apps you need and use regularly. If you no longer use an app, uninstall it to keep it from accessing your information unnecessarily. This will help you save memory, and reduce your exposure to potential risks. For apps that you do use, limit their access to personal information so that they only access what they need to function properly. For example, a weather app doesn\u2019t need access to your photos.<\/p>\n<p>5) <strong>Use mobile security\u2014<\/strong>Comprehensive protection, like <a href=\"https:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a>, can help guard against viruses, malware, device theft and other threats. It can also help you understand how your apps are using your personal information.<\/p>\n<p>Looking for more mobile security tips and trends? Be sure to follow <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee Home<\/a> on Twitter, and like us on <a href=\"https:\/\/www.facebook.com\/McAfee\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> https:\/\/www.theverge.com\/2017\/2\/16\/14634656\/android-ios-market-share-blackberry-2016<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both&#8230;<\/p>\n","protected":false},"author":674,"featured_media":129703,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,1838],"tags":[37,180],"coauthors":[3973],"class_list":["post-79968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-mobile-security","tag-android","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>5 Tips for Avoiding Android Malware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Tips for Avoiding Android Malware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-12T16:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T08:18:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"5 Tips for Avoiding Android Malware\",\"datePublished\":\"2017-10-12T16:00:23+00:00\",\"dateModified\":\"2025-08-01T08:18:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\"},\"wordCount\":796,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"keywords\":[\"android\",\"malware\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\",\"name\":\"5 Tips for Avoiding Android Malware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"datePublished\":\"2017-10-12T16:00:23+00:00\",\"dateModified\":\"2025-08-01T08:18:59+00:00\",\"description\":\"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg\",\"width\":614,\"height\":300,\"caption\":\"virus scan looking for malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"5 Tips for Avoiding Android Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Tips for Avoiding Android Malware | McAfee Blog","description":"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"5 Tips for Avoiding Android Malware | McAfee Blog","og_description":"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-10-12T16:00:23+00:00","article_modified_time":"2025-08-01T08:18:59+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"5 Tips for Avoiding Android Malware","datePublished":"2017-10-12T16:00:23+00:00","dateModified":"2025-08-01T08:18:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/"},"wordCount":796,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","keywords":["android","malware"],"articleSection":["How To Guides and Tutorials","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/","name":"5 Tips for Avoiding Android Malware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","datePublished":"2017-10-12T16:00:23+00:00","dateModified":"2025-08-01T08:18:59+00:00","description":"The ubiquity of mobile phones has created a unique opportunity for cybercriminals. They now have a way of accessing both our money and personal","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/02\/614x300_VirusScan.jpg","width":614,"height":300,"caption":"virus scan looking for malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/5-tips-avoiding-android-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"5 Tips for Avoiding Android Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=79968"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79968\/revisions"}],"predecessor-version":[{"id":214145,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/79968\/revisions\/214145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/129703"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=79968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=79968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=79968"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=79968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}