{"id":84421,"date":"2018-02-12T06:00:47","date_gmt":"2018-02-12T14:00:47","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84421"},"modified":"2025-08-31T19:20:40","modified_gmt":"2025-09-01T02:20:40","slug":"dating-devices-personal-security","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/","title":{"rendered":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security"},"content":{"rendered":"<p>L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the online social interaction that comes with them. But unfortunately, we\u2019re not the only ones who love them, as cybercriminals are attempting to capitalize on our connected lifestyles in order to swoop valuable personal information. Let\u2019s explore why this is happening, how our increased device use impacts our lives, and what we can do to show our personal security some love.<\/p>\n<h2><strong>Sharing data during modern dating<\/strong><\/h2>\n<p>We love our devices largely for the connectedness and information they provide us with. For example, modern romance has shifted towards dating apps largely because these apps connect us with world quickly and easily. On these dating apps, you share information about yourself with strangers. But could you be sharing that info with strangers that aren\u2019t even on the app? Just a few weeks ago, security researchers\u00a0<a href=\"https:\/\/www.theverge.com\/2018\/1\/23\/16923504\/tinder-unencrypted-hackers-swiping-https-protocol\" target=\"_blank\" rel=\"noopener\">discovered<\/a>\u00a0that popular dating app Tinder still lacks basic HTTPS encryption for photos. Just by being on the same Wi-Fi network as any user of Tinder&#8217;s iOS or Android app, potential hackers could see any photo the user did, or even inject their own images into his or her photo stream. These crooks could even watch a user swipe left or right. By trying to stay connected online, these dating app users could be helping cybercriminals connect to their personal data instead.<\/p>\n<h2><strong>The effects of our device devotion<\/strong><\/h2>\n<p>Ironically enough, our efforts to engage socially online don\u2019t exactly help us strengthen real-life relationships. In fact, we know from last year\u2019s <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/connected-relationships-valentines-2017\/\" target=\"_blank\" rel=\"noopener\">Connected Relationships survey<\/a> that as we use our connected devices more and more each day, our relationships are negatively impacted by that use.<\/p>\n<p>The Connected Relationships survey respondents said that they spend an equal amount of time at home online (38%) as they do interacting with others face-to-face. And 40% felt their significant other paid more attention to their own device when they were together one-on-one. You could even say that, for many, these devices have become\u00a0the \u201cother (wo)man\u201d in the relationship.<\/p>\n<p>Though devices have managed to cause some minor riffs between couples, that doesn\u2019t stop couples from sharing even when they shouldn\u2019t. Out of those surveyed, nearly 30% of couples share passwords to social media accounts, 28% share passwords to personal email accounts, and most shockingly, more than 20% share their work-specific devices and accounts with their significant other.<\/p>\n<h2><strong> Spread the love to your personal security<\/strong><\/h2>\n<p>So, whether you\u2019re sharing your private data with a dating app, or your account info with a loved one, it\u2019s important you show your personal security some love too. To do just that, follow these tips:<\/p>\n<ul>\n<li><strong>Limit how personal you get.<\/strong> Whether its Tinder, another dating app, or just any regular app, only provide the program with information that is absolutely necessary &#8212; this especially goes for financial data. Additionally, take the time to remove unnecessary personal information from your devices in general that could compromise your security. The less personal data you have on a device, the safer your information will be.<\/li>\n<li><strong>Make passwords a priority.\u00a0<\/strong>Ensure your passwords are secure and strong by including numbers, lowercase and uppercase letters, as well as symbols. If you\u2019re someone who knows the struggle with generating and remembering multiple unique passwords, use a password manager, like the\u00a0<a href=\"https:\/\/www.truekey.com\/\" target=\"_blank\" rel=\"noopener\">True Key app<\/a>. A password manager can help you create strong and secure passwords and log you into your favorite websites automatically using multi-factor authentication.<\/li>\n<li><strong>Focus on what really matters.\u00a0<\/strong>We love our devices, but it\u2019s important to\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/connected-vacations-top-takeaways-from-our-unplugging-survey\/\" target=\"_blank\" rel=\"noopener\">disconnect<\/a>\u00a0every now and then to spend time with the important people in our lives, like friends and family. Don\u2019t worry: your social networks will be right there waiting for you when you get back.<\/li>\n<\/ul>\n<p>And, of course, stay on top of the latest consumer and mobile security threats by following\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L is for the way you look at your technology, O is for you\u2019re not the only one looking at&#8230;<\/p>\n","protected":false},"author":674,"featured_media":190155,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[4322,3949],"coauthors":[3973],"class_list":["post-84421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-app-security","tag-cybersafety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog<\/title>\n<meta name=\"description\" content=\"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-12T14:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T02:20:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security\",\"datePublished\":\"2018-02-12T14:00:47+00:00\",\"dateModified\":\"2025-09-01T02:20:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\"},\"wordCount\":689,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png\",\"keywords\":[\"app security\",\"cybersafety\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\",\"name\":\"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png\",\"datePublished\":\"2018-02-12T14:00:47+00:00\",\"dateModified\":\"2025-09-01T02:20:40+00:00\",\"description\":\"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png\",\"width\":1000,\"height\":563,\"caption\":\"man and woman online dating\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog","description":"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog","og_description":"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-02-12T14:00:47+00:00","article_modified_time":"2025-09-01T02:20:40+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security","datePublished":"2018-02-12T14:00:47+00:00","dateModified":"2025-09-01T02:20:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/"},"wordCount":689,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png","keywords":["app security","cybersafety"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/","name":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png","datePublished":"2018-02-12T14:00:47+00:00","dateModified":"2025-09-01T02:20:40+00:00","description":"L is for the way you look at your technology, O is for you\u2019re not the only one looking at it. We L-O-V-E our connected devices, our apps, and all the","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/02\/1000x563_Blog_Spot-Dating-Scams.png","width":1000,"height":563,"caption":"man and woman online dating"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/dating-devices-personal-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Are We Dating Our Devices? How Our Online Interactions Impact Our Personal Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84421"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84421\/revisions"}],"predecessor-version":[{"id":221752,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84421\/revisions\/221752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/190155"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84421"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}