{"id":82415,"date":"2017-11-16T09:17:17","date_gmt":"2017-11-16T17:17:17","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=82415"},"modified":"2025-06-02T01:29:47","modified_gmt":"2025-06-02T08:29:47","slug":"iot-devices-gift-keeps-giving-hackers","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/","title":{"rendered":"IoT Devices: The Gift that Keeps on Giving&#8230; to Hackers"},"content":{"rendered":"<p><strong>McAfee Advanced Threat Research on <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/most-hackable-gifts\/\">Most Hackable Gifts<\/a><\/strong><\/p>\n<p>You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances and other devices hitting the market and maybe even showing up in your own home. The sale of these \u201cInternet-of-Things\u201d (IoT) devices is expected to reach 600 million units this year and, unfortunately, security has sometimes become a casualty of the race among manufacturers to be the first to sell these smart gadgets into millions of homes. This has provided potentially millions of opportunities for hackers to see what devices they can compromise and possible even control. In the past year hackers and security researchers were able to bypass the security of a range of these IoT devices.<\/p>\n<h2>Toys<\/h2>\n<p>It was discovered early this year the Cayla doll could allow hackers to take control of the toy and record video and audio without the user\u2019s consent. A demonstration by the National Cyber Security Centre in London also shows the doll could be used to unlock smart locks allowing criminals to compromise your home through the front door. The flaw is so serious Germany\u2019s Federal Network Agency required retailers to pull the dolls off shelves, banning them throughout the country. In the United States, the Federal Bureau of Investigation<b>\u00a0<\/b>(FBI) also released a <a href=\"https:\/\/www.ic3.gov\/media\/2017\/170717.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">public service announcement<\/a> alerting the public to the potential risk Internet connected toys pose. The defect in the Cayla doll lies in the insecure Bluetooth connection, allowing anyone to listen and converse through the doll using an ordinary mobile phone.<\/p>\n<p>Similar security flaws were <a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-4991102\/Is-stranger-hacking-child-s-smart-watch.html\" target=\"_blank\" rel=\"noopener noreferrer\">recently found<\/a> in multiple children\u2019s watches being sold across Europe and the UK. Security experts commissioned by the Norwegian Consumer Council found the smart watches could allow outsiders to track the child through the GPS signal, access personal data on the device, disable the emergency SOS function, and remotely listen to the youngster without the knowledge of a parent or guardian. On a positive note, the manufacturers behind the watches have responded responsibly and either have or are in the process of correcting the defects.<a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n<h2>Cameras<\/h2>\n<p>Internet connected cameras and baby monitors have been around for a few years, but manufactures are still shipping insecure devices. A quick search on the IoT search engine Shodan for the word \u201cIPCamera\u201d shows more than 39,000 in total. This year saw multiple stories surface involving hackers able to remotely control cameras, record video and audio, and even speak to children. We often see consumers configure cameras with remote access, but fail to put in place the correct security controls. Failure to change default passwords or use of weak passwords is a common offense among users. In other instances, the manufacturer of the device uses outdated third party software or leaves ports open by default.<\/p>\n<h2>Digital Assistants<\/h2>\n<p>Controlling your smart devices with digital assistants from Apple, Amazon, Google, and others are a neat way to control lights, appliances, and the home\u2019s A\/C unit. Researchers from Zheijiang University in China released a report\u00a0in August showing it\u2019s possible to interact with the assistant using inaudible\u00a0ultrasound commands. The scientists dubbed their findings the \u201cDolphinAttack\u201d and could issue commands to the device at a very high frequency that is too high for humans to hear but was still understood by a range of assistants, including Siri, Google Now, Cortana, and Alexa. The researchers <a href=\"https:\/\/www.theverge.com\/2017\/9\/7\/16265906\/ultrasound-hack-siri-alexa-google\" target=\"_blank\" rel=\"noopener noreferrer\">demonstrated<\/a> it\u2019s possible for someone to issue a range of commands from a distance without anyone near the device realizing the assistant was being controlled remotely. Although no real-world hacks are known at this time it\u2019s safe to say hackers are well aware of the vulnerability.<\/p>\n<h2>Drones<\/h2>\n<p>Drones will most certainly be at the top of many a Christmas list this year. The market has exploded and the sale of drones for personal use are <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3602317\" target=\"_blank\" rel=\"noopener noreferrer\">expected to be over $2 billion globally<\/a> in 2017. With that many drones in the sky, and ample evidence that the devices can be hijacked, the security world has taken serious notice. \u00a0Security researcher Jonathan Andersson\u00a0<a href=\"https:\/\/thehackernews.com\/2016\/10\/how-to-hack-drone.html\" target=\"_blank\" rel=\"noopener noreferrer\">demonstrated<\/a> how he was able take control of a drone mid-flight, resulting in the owner losing complete control. The flaw lies in the wireless transmission control protocol DSMx, which is used in the communication between radio controllers and many remote-control devices, including drones. The researcher created a hardware device which takes advantage of the DSMx protocol flaw, and allows him to make the hijacked drone perform a range of movements, including stopping, starting, and steering. The good news is the hacking device was not made public, but that won\u2019t stop hackers from attempting to make their own similar gadget to take control of drones from unsuspecting users.<\/p>\n<p>It\u2019s not uncommon for hackers to prey on the latest popular Internet connected devices. Millions of IoT devices will be purchased this holiday season, and consumers will be well-served to do their homework. You don\u2019t need to become an expert, but reading the user\u2019s manual before connecting a device to the Internet is a good practice to make sure the gadget is setup properly. Make sure to also keep the device\u2019s firmware up to date, downloading any manufacturer updates to safely fix any newly discovered vulnerability flaws. If you\u2019re purchasing an IoT device as a gift, make sure to research it first for known vulnerabilities to make sure you don\u2019t get caught giving a gift that could turn out to be security risk. It only takes one hacked device that is connected to your home\u2019s Wifi to allow personal data to be stolen, devices to be hijacked, or your connected gadgets themselves becoming part of a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Botnet\" target=\"_blank\" rel=\"noopener noreferrer\">botnet<\/a> of infected systems that hackers use to launch attacks on other home and business systems.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>McAfee Advanced Threat Research on Most Hackable Gifts You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants,&#8230;<\/p>\n","protected":false},"author":878,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4449,5084],"coauthors":[4833],"class_list":["post-82415","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-hacking","tag-iot"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers<\/title>\n<meta name=\"description\" content=\"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-16T17:17:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T08:29:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/LabsMap.png\" \/>\n<meta name=\"author\" content=\"Tim Hux\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tim_hux\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tim Hux\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\"},\"author\":{\"name\":\"Tim Hux\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8d881d3760c0cd7284544a1158f8383d\"},\"headline\":\"IoT Devices: The Gift that Keeps on Giving&#8230; to Hackers\",\"datePublished\":\"2017-11-16T17:17:17+00:00\",\"dateModified\":\"2025-06-02T08:29:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\"},\"wordCount\":968,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"cybersecurity\",\"hacking\",\"IoT\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\",\"name\":\"IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2017-11-16T17:17:17+00:00\",\"dateModified\":\"2025-06-02T08:29:47+00:00\",\"description\":\"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IoT Devices: The Gift that Keeps on Giving&#8230; to Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8d881d3760c0cd7284544a1158f8383d\",\"name\":\"Tim Hux\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/62e22279f24354075fe776a3c989cc53\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Tim-Hux-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Tim-Hux-96x96.jpg\",\"caption\":\"Tim Hux\"},\"description\":\"Tim Hux Security Researcher Advanced Threat Research Tim has over 15 years\u2019 experience in the cyber security field and performs threat research and analysis on today\u2019s top threats.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/timhux\/\",\"https:\/\/x.com\/tim_hux\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/tim-hux\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers","description":"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers","og_description":"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-11-16T17:17:17+00:00","article_modified_time":"2025-06-02T08:29:47+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/11\/LabsMap.png","type":"","width":"","height":""}],"author":"Tim Hux","twitter_card":"summary_large_image","twitter_creator":"@tim_hux","twitter_site":"@McAfee","twitter_misc":{"Written by":"Tim Hux","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/"},"author":{"name":"Tim Hux","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8d881d3760c0cd7284544a1158f8383d"},"headline":"IoT Devices: The Gift that Keeps on Giving&#8230; to Hackers","datePublished":"2017-11-16T17:17:17+00:00","dateModified":"2025-06-02T08:29:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/"},"wordCount":968,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["cybersecurity","hacking","IoT"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/","name":"IoT Devices: The Gift that Keeps on Giving\u2014 to Hackers","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2017-11-16T17:17:17+00:00","dateModified":"2025-06-02T08:29:47+00:00","description":"You\u2019ve probably noticed the recent increase in Internet connected drones, digital assistants, toys, appliances hitting the market.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/iot-devices-gift-keeps-giving-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"IoT Devices: The Gift that Keeps on Giving&#8230; to Hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8d881d3760c0cd7284544a1158f8383d","name":"Tim Hux","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/62e22279f24354075fe776a3c989cc53","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Tim-Hux-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Tim-Hux-96x96.jpg","caption":"Tim Hux"},"description":"Tim Hux Security Researcher Advanced Threat Research Tim has over 15 years\u2019 experience in the cyber security field and performs threat research and analysis on today\u2019s top threats.","sameAs":["https:\/\/www.linkedin.com\/in\/timhux\/","https:\/\/x.com\/tim_hux"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/tim-hux\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/878"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=82415"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82415\/revisions"}],"predecessor-version":[{"id":214823,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/82415\/revisions\/214823"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=82415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=82415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=82415"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=82415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}