{"id":82158,"date":"2017-11-10T09:00:04","date_gmt":"2017-11-10T17:00:04","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=82158"},"modified":"2025-08-13T23:05:35","modified_gmt":"2025-08-14T06:05:35","slug":"social-engineering-scammers","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/","title":{"rendered":"Why Social Engineering is a Scammer\u2019s Secret Weapon"},"content":{"rendered":"<p>Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation is often referred to as social engineering, and it\u2019s worth knowing about because although the scams change, the methods remain the same.<\/p>\n<p>Social engineering can happen online, over the phone, or even in person. Scammers often try to win your trust by pretending to be legitimate businesses or person, offering you a great deal, or playing on your sympathies. Just think of the now-famous <a href=\"https:\/\/en.wikipedia.org\/wiki\/Advance-fee_scam\" target=\"_blank\" rel=\"noopener\">Nigerian prince scam<\/a>, in which fraudsters would ask for help accessing a large sum of money, and request the victim\u2019s banking details to complete a money transfer in exchange for a payout. Not only did these scams play on victims\u2019 sympathies, but also their desire for easy money. Modern-day scams work much the same way.<\/p>\n<h2>Most Popular Scams<\/h2>\n<p>Let\u2019s take a look at some of the most popular scams now, and how social engineering plays a part.<\/p>\n<p><strong>Ransomware\u2014<\/strong>This online threat has grabbed headlines for a reason: it\u2019s frightening, and it works. Ransomware, which has grown exponentially over the last three years, usually starts with the victim downloading what looks like an innocuous file, or even clicking on a dangerous webpage. Scammers use social engineering to get users to click by offering something free (like a gaming app), or enticing, like an email prize notification, or shocking headline.<\/p>\n<p>Once the victim downloads the infected file, it locks up their computer or device and demands money before the victim can regain access to their files. These could include personal photos or sensitive tax and identity information, which is what makes this scam so scary. The trick is, even if you pay the ransom you may never get access to your files. That\u2019s why it\u2019s crucial to back up your files on an external hard drive or through a cloud storage service.<\/p>\n<p><strong>The CEO Scam<\/strong>\u2014This scam is usually done via email, and takes advantage of our assumption that anything that comes from a known email address can be trusted. The cybercriminals will spoof, or fake, an email address of a top executive in a company and then use that spoofed address to send messages requesting sensitive or private information from other members of the organization, like wage details, Social Security numbers, and financial records.<\/p>\n<p>This data can then be used to file a fraudulent tax return and receive a refund, or apply for credit in a victim\u2019s name, for example. Because the email address appears to come from within the organization, and recipients are accustomed to complying with work requests, it\u2019s a very easy scam to fall for.<\/p>\n<p><strong>The Free Vacation Scam\u2014<\/strong>Always a classic, the phone scam still hooks a ton of victims each year. Once again, the social engineering scammers are taking advantage of our desire for things that are free, or a great deal. They usually start by telling the victims that they have won a vacation to Las Vegas or another sought-after locale, and all they need to do is provide their credit card number to pay for a tax or other fees.<\/p>\n<p>Now that you know how social engineering works in common scams, here are some tips to help you steer clear of any new versions of these old tricks:<\/p>\n<ul>\n<li>Always be suspicious of any free offers, including free mobile apps.<\/li>\n<li>Never respond to a request for sensitive or private information, even if it appears to come from a trusted source. If you have doubts, message or email the person directly from your saved contact details, or better yet, talk to them in person to confirm their request.<\/li>\n<li>Register both your home and mobile numbers on the \u201cdo not call\u201d list to avoid phone scams.<\/li>\n<li>Don\u2019t accept friend requests from people you don\u2019t know in real life, and never respond to texts from strangers.<\/li>\n<li>Be careful when opening email attachments. Make sure you know the sender and have requested the attached information first.<\/li>\n<li>Use <a href=\"https:\/\/www.mcafee.com\/us\/index.html\" target=\"_blank\" rel=\"noopener\">comprehensive security software<\/a> to help protect you from malware, ransomware, and other online threats.<\/li>\n<li>Keep up-to-date on the <a href=\"https:\/\/securingtomorrow.mcafee.com\/\" target=\"_blank\" rel=\"noopener\">latest scams<\/a> so you know what to look out for.<\/li>\n<\/ul>\n<p>Looking for more mobile security tips and trends? Be sure to follow <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee Home<\/a> on Twitter, and like us on <a href=\"https:\/\/www.facebook.com\/McAfee\/\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind&#8230;<\/p>\n","protected":false},"author":674,"featured_media":34608,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[76,4287],"coauthors":[3973],"class_list":["post-82158","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybercrime","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-10T17:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T06:05:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Why Social Engineering is a Scammer\u2019s Secret Weapon\",\"datePublished\":\"2017-11-10T17:00:04+00:00\",\"dateModified\":\"2025-08-14T06:05:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\"},\"wordCount\":732,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg\",\"keywords\":[\"cybercrime\",\"social engineering\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\",\"name\":\"Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg\",\"datePublished\":\"2017-11-10T17:00:04+00:00\",\"dateModified\":\"2025-08-14T06:05:35+00:00\",\"description\":\"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg\",\"width\":280,\"height\":250,\"caption\":\"social engineering graphics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Social Engineering is a Scammer\u2019s Secret Weapon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog","description":"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog","og_description":"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-11-10T17:00:04+00:00","article_modified_time":"2025-08-14T06:05:35+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Why Social Engineering is a Scammer\u2019s Secret Weapon","datePublished":"2017-11-10T17:00:04+00:00","dateModified":"2025-08-14T06:05:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/"},"wordCount":732,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg","keywords":["cybercrime","social engineering"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/","name":"Why Social Engineering is a Scammer\u2019s Secret Weapon | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg","datePublished":"2017-11-10T17:00:04+00:00","dateModified":"2025-08-14T06:05:35+00:00","description":"Criminals and scammers love to trick, deceive and manipulate their victims into handing over sensitive information, and money. This kind of exploitation","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/social_engineering.jpg","width":280,"height":250,"caption":"social engineering graphics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/social-engineering-scammers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Why Social Engineering is a Scammer\u2019s Secret Weapon"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82158","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=82158"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82158\/revisions"}],"predecessor-version":[{"id":219632,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82158\/revisions\/219632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/34608"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=82158"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=82158"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=82158"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=82158"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}