{"id":81985,"date":"2017-11-13T21:01:52","date_gmt":"2017-11-14T05:01:52","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=81985"},"modified":"2025-08-13T23:04:08","modified_gmt":"2025-08-14T06:04:08","slug":"most-hackable-gifts","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/","title":{"rendered":"A Cybersecurity Carol: Key Takeaways From This Year&#8217;s Most Hackable Holiday Gifts"},"content":{"rendered":"<p>A classic holiday story is <em>A Christmas Carol<\/em> by Charles Dickens, which tells the tale of how a grumpy man learns from his mistakes, as guided by the Ghosts of Christmas Past, Present and Future. Funny enough, our most Hackable Gifts Campaign resembles this tale, as there are lessons we\u2019ve learned around holiday shopping in year\u2019s past, important takeaways from this year\u2019s findings, and, of course, things we need to start thinking ahead to. Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-82235\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL.jpg\" alt=\"\" width=\"366\" height=\"1432\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL.jpg 1666w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL-77x300.jpg 77w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL-768x3004.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL-262x1024.jpg 262w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL-128x500.jpg 128w\" sizes=\"auto, (max-width: 366px) 100vw, 366px\" \/><\/p>\n<h2><strong>The Past<\/strong><\/h2>\n<p>Just like <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/most-hackable-gifts-2016\/\" target=\"_blank\" rel=\"noopener\">last year<\/a>, consumers realize the importance of protecting their online identity and internet-connected devices, but are unsure if they are taking the right security measures or don\u2019t care to make security a giant priority. Out of the 1,206 adults surveyed this year, 20% of consumers are not worried about internet security and would still buy a must-have connected device if they knew it was susceptible to security breaches. For 40%, security is not a top priority, but considered after purchase.<\/p>\n<p>This is troubling because, just like last year, the top spot for the Most Hackable Gifts is internet-connected devices. Specifically&#8211; laptops, smartphones, and tablets, which are common gifts as they tend to be released around the holidays.<\/p>\n<p>Also like last year, both drones and smart home appliances make our Most Hackable Gift list. However, it\u2019s important to keep in mind that <a href=\"https:\/\/www.airspacemag.com\/airspacemag\/drone-hacking-made-easy-180961052\/\" target=\"_blank\" rel=\"noopener\">drones can be hacked in flight<\/a> and smart home devices can be used as pawns in a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-ddos\/\" target=\"_blank\" rel=\"noopener\">distributed denial of service attack (DDoS)<\/a>. So, it\u2019s crucial to be wary when eyeing both as potential gifts for loved ones.<\/p>\n<h2><strong>The Present <\/strong><\/h2>\n<p>Fast forward to Most Hackable Gifts 2017, and a few things have changed with the present. For instance, media players and streaming sticks took one of the top spots on our gift guide last year, but were replaced by connected toys. Since manufacturers are rushing to connect almost everything to the internet, it only makes sense that the toys that children play with are no different. Many toys come equipped with GPS chips, microphones and even cameras. But manufacturers may not be putting these devices\u2019 security as a top priority, which could leave these toys vulnerable to leaking personal information or even allow hackers to hijack the camera or microphone. Another new device on our list: digital assistants. They are the new hot item of 2017, and make great gifts for just about anyone, but like any connected device, <a href=\"https:\/\/www.wired.com\/story\/amazon-echo-wiretap-hack\/\" target=\"_blank\" rel=\"noopener\">digital assistants can be the target<\/a> of cybercriminals.<\/p>\n<p>And since connected devices are more popular than ever in present day, it only makes sense that consumers have now started trading them in for an upgrade. In fact, 50% of respondents plan to give away or sell an old connected device after receiving a new one for the holidays, but 20% claim they do not know how to permanently delete their personal information before selling or giving away old devices.<\/p>\n<h2><strong>The Future<\/strong><\/h2>\n<p>Now, the holiday season is practically here. But that doesn\u2019t mean it\u2019s too late to start preparing for your future security. To ensure your future is merry and bright (and not full of cyberattacks) follow these tips:<\/p>\n<ul>\n<li><strong>Change default passwords, and do an update right away.<\/strong> If you receive a connected gift, change the default password first and foremost. Default manufacturer passwords are rather easy for criminals to crack. Also, your device\u2019s software will need to be updated at some point. In a lot of cases, devices will have updates waiting from them as soon as they\u2019re taken out of the box. The first time you power up your device, you should check to see if there are any updates or patches from the manufacturer.<\/li>\n<li><strong>Research before you buy<\/strong>. It\u2019s important you do your homework to make sure that the toy you are purchasing has not had any reported security issues. A simple Google search on the product, as well as the manufacturer, will often do the trick.<\/li>\n<li><strong>Secure your home\u2019s internet at the source<\/strong>. You can do this by using a solution like <a href=\"https:\/\/securehomeplatform.mcafee.com\/\" target=\"_blank\" rel=\"noopener\">McAfee Secure Home Platform<\/a> to ensure that you know what is connecting to your network and the devices on it. Additionally, be sure to read the privacy policies provided by manufacturers so you know exactly what information your device is collecting.<\/li>\n<\/ul>\n<p>To learn more about hackable toys and see the misadventures of Ted and Ned check out our <a href=\"http:\/\/islandofhackabletoys.com\/\" target=\"_blank\" rel=\"noopener\">website<\/a>. And, of course, stay on top of the latest consumer and mobile security threats by following\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.<\/p>\n","protected":false},"author":674,"featured_media":93242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4452,4131],"coauthors":[3973],"class_list":["post-81985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-internet-of-things"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Cybersecurity Carol: Key Takeaways From This Year&#039;s Most Hackable Holiday Gifts | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cybersecurity Carol: Key Takeaways From This Year&#039;s Most Hackable Holiday Gifts | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-14T05:01:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T06:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1666\" \/>\n\t<meta property=\"og:image:height\" content=\"6516\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"A Cybersecurity Carol: Key Takeaways From This Year&#8217;s Most Hackable Holiday Gifts\",\"datePublished\":\"2017-11-14T05:01:52+00:00\",\"dateModified\":\"2025-08-14T06:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\"},\"wordCount\":826,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"keywords\":[\"cybersecurity\",\"Internet of Things\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\",\"name\":\"A Cybersecurity Carol: Key Takeaways From This Year's Most Hackable Holiday Gifts | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"datePublished\":\"2017-11-14T05:01:52+00:00\",\"dateModified\":\"2025-08-14T06:04:08+00:00\",\"description\":\"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg\",\"width\":2048,\"height\":1360,\"caption\":\"smart gifts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Cybersecurity Carol: Key Takeaways From This Year&#8217;s Most Hackable Holiday Gifts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Cybersecurity Carol: Key Takeaways From This Year's Most Hackable Holiday Gifts | McAfee Blog","description":"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"A Cybersecurity Carol: Key Takeaways From This Year's Most Hackable Holiday Gifts | McAfee Blog","og_description":"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-11-14T05:01:52+00:00","article_modified_time":"2025-08-14T06:04:08+00:00","og_image":[{"width":1666,"height":6516,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/11\/2017_McAfee_HackableGifts_Infographic_FINAL.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"A Cybersecurity Carol: Key Takeaways From This Year&#8217;s Most Hackable Holiday Gifts","datePublished":"2017-11-14T05:01:52+00:00","dateModified":"2025-08-14T06:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/"},"wordCount":826,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","keywords":["cybersecurity","Internet of Things"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/","name":"A Cybersecurity Carol: Key Takeaways From This Year's Most Hackable Holiday Gifts | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","datePublished":"2017-11-14T05:01:52+00:00","dateModified":"2025-08-14T06:04:08+00:00","description":"Now, in its third year, the McAfee Most Hackable Holiday Gifts survey is here again to examine how consumers approach device security around the holidays, and what they need to stay secure while staying in the yuletide sprit. Let\u2019s take a look at what we can learn from McAfee\u2019s Most Hackable Holiday Gifts past, present, and future.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Tablet-computer-in-men-hands.-Near-the-table-with-tablet-computer-red-gift-box-christmas-toys-and-fluffy-fir-branches.-.jpg","width":2048,"height":1360,"caption":"smart gifts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/most-hackable-gifts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"A Cybersecurity Carol: Key Takeaways From This Year&#8217;s Most Hackable Holiday Gifts"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=81985"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81985\/revisions"}],"predecessor-version":[{"id":219617,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81985\/revisions\/219617"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93242"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=81985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=81985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=81985"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=81985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}