{"id":84485,"date":"2018-02-15T07:00:13","date_gmt":"2018-02-15T15:00:13","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84485"},"modified":"2025-08-05T09:24:31","modified_gmt":"2025-08-05T16:24:31","slug":"warning-crypto-currency-mining-targeting-android","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/","title":{"rendered":"Warning: Crypto-Currency Mining is Targeting Your Android"},"content":{"rendered":"<p>Cryptocurrency, a virtual form of currency designed to work as a secure form of exchange, has gained a lot of traction in the world of finance and technology. But for many, the concept of obtaining cryptocurrency, or &#8220;crypto-mining,\u201d is obscure. Investopedia <a href=\"https:\/\/www.investopedia.com\/terms\/b\/bitcoin-mining.asp\" target=\"_blank\" rel=\"noopener\">defines<\/a> crypto-mining as, \u201cthe process by which transactions are verified and added to the public ledger, known as the blockchain, and also the means through which new currencies such as Bitcoin and Ethereum are released.\u201d<\/p>\n<p>The practice has been around since 2009, and anyone with access to the Internet, the required programs and hardware can participate in mining. In fact, by the end of this month, Forbes Magazine will have published its first <a href=\"https:\/\/www.forbes.com\/sites\/jeffkauflin\/2018\/02\/07\/cryptocurrency-richest-people-crypto-bitcoin-ether-xrp\/#4b0ca9f372d3\" target=\"_blank\" rel=\"noopener\">\u201cTop Richest\u201d<\/a> list dedicated to Crypto Millionaires.<\/p>\n<p>With the rise in popularity of digital currency, it\u2019s no surprise that cybercriminals across the globe are leveraging malicious code to <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/malware-mines-steals-cryptocurrencies-from-victims\/\" target=\"_blank\" rel=\"noopener\">obtain it<\/a>. Hackers would rather develop or utilize mining malware instead of paying the expensive price tag associated with mining machines, which can be upwards of $5000. In China, the <a href=\"https:\/\/www.newsbtc.com\/2018\/02\/07\/crypto-mining-worm-attacking-android-in-china\/\" target=\"_blank\" rel=\"noopener\">ADB Miner<\/a> malware is spreading and targeting thousands of Android devices for the primary purpose of mining cryptocurrency. The malware is spread through the publicly accessible <a href=\"https:\/\/developer.android.com\/studio\/command-line\/adb.html\" target=\"_blank\" rel=\"noopener\">Android Debug Bridge (abd)<\/a> on an opened port 5555. This port is typically closed but can be opened by an ADB debug tool. Once infected, a device will look for other devices with the same vulnerability to spread the malware and leverage other Android-based smartphones, tablets, and televisions for crypto-mining.<\/p>\n<p>So why are cybercriminals now targeting Android mobile devices? This could be due to the fact that hackers know they can easily manipulate vulnerabilities in Google Play\u2019s app vetting system. Last year McAfee Mobile Threat Research identified more than 4,000 apps that were removed from Google Play without notification to users. Currently, the app store does not have consistent or centralized reporting available for app purchasers. Even if an app is supported by Google Play at the time of download, it could later be identified as malicious and Android users may be unaware of the fact that they\u2019re harboring a bad app.<\/p>\n<p>Researchers have found over 600 blacklisted malicious cryptocurrency apps across 20 app stores including Apple and Google Play. Google Play was found to have the <a href=\"https:\/\/www.cnbc.com\/2018\/01\/24\/hackers-targeting-apple-google-app-stores-with-malicious-crypto-apps.html\" target=\"_blank\" rel=\"noopener\">highest amount of malicious crypto apps<\/a>, with 272 available for download. In the United States, researchers have found another crypto-mining malware that is so demanding of phone processors, its causing them to implode. <a href=\"http:\/\/www.zdnet.com\/article\/this-crypto-mining-android-malware-is-so-demanding-it-burst-a-smartphone\/\" target=\"_blank\" rel=\"noopener\">Loapi<\/a>, a newly-discovered Trojan crypto-miner, can cause phone batteries to swell up and burst open the device&#8217;s back cover, and has been found in up to 20 mobile apps.<\/p>\n<p>Crypto-mining malware isn\u2019t a new phenomenon. Before the WannaCry attacks last summer, cryptocurrency malware sprung up as another malicious software looking to take advantage of the same Windows vulnerabilities that WannaCry exploited. But, instead of locking down systems with ransomware, these cybercriminals were putting them to work,\u00a0using a cryptocurrency mining malware called <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/adylkuzz-cryptocurrency-miner-may-have-saved-you-from-the-wannacry-ransomware\/\" target=\"_blank\" rel=\"noopener\">Adylkuzz<\/a>.<\/p>\n<h2>Tips to Protect Yourself From Crypto-Mining Malware<\/h2>\n<p>Here are a few tips to ensure your Android-devices are protected from crypto-mining malware:<\/p>\n<ul>\n<li><strong>Download your apps from a legitimate source.<\/strong> While some malicious apps may slip through the cracks, app stores like Google Play do have security measures in place to protect users, and it\u2019s much safer than downloading from an unknown source.<\/li>\n<li><strong>Delete any apps that you haven\u2019t used over the past 6-months.<\/strong> An app\u2019s security can change over time; applications that were once supported by an app store can be flagged as malicious and removed from the platform without notification. If an app is no longer supported in the app store, you should delete it immediately.<\/li>\n<li><strong>Keep all of your software up to date. <\/strong>Many of the more harmful malware attacks we\u2019ve seen, like the Equifax <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/need-know-equifax-data-breach\/\" target=\"_blank\" rel=\"noopener\">data breach<\/a>, take advantage of software vulnerabilities in common applications, such as operating systems and browsers. Having the latest software and application versions ensures that any known bugs or exploits are patched, and is one of the best defenses against viruses and malware.<\/li>\n<li><strong>Double up on your mobile security software<\/strong>. I can\u2019t stress enough how important is to use comprehensive\u00a0<a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/index.html\" target=\"_blank\" rel=\"noopener\">security software\u00a0<\/a>to protect your personal devices.<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security tips and trends? Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\/\">Facebook<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency, a virtual form of currency designed to work as a secure form of exchange, has gained a lot of&#8230;<\/p>\n","protected":false},"author":674,"featured_media":125960,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[37,180,214],"coauthors":[3973],"class_list":["post-84485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-android","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cryptocurrency Malware is targeting Androids in the US and abroad. Here&#039;s what you need to know about the threats they&#039;re posing to your mobile phones and how to stay protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cryptocurrency Malware is targeting Androids in the US and abroad. Here&#039;s what you need to know about the threats they&#039;re posing to your mobile phones and how to stay protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-15T15:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-05T16:24:31+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Warning: Crypto-Currency Mining is Targeting Your Android\",\"datePublished\":\"2018-02-15T15:00:13+00:00\",\"dateModified\":\"2025-08-05T16:24:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\"},\"wordCount\":726,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"keywords\":[\"android\",\"malware\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\",\"name\":\"Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"datePublished\":\"2018-02-15T15:00:13+00:00\",\"dateModified\":\"2025-08-05T16:24:31+00:00\",\"description\":\"Cryptocurrency Malware is targeting Androids in the US and abroad. Here's what you need to know about the threats they're posing to your mobile phones and how to stay protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg\",\"width\":300,\"height\":200,\"caption\":\"Bitcoin transaction on mobile\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Warning: Crypto-Currency Mining is Targeting Your Android\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog","description":"Cryptocurrency Malware is targeting Androids in the US and abroad. Here's what you need to know about the threats they're posing to your mobile phones and how to stay protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog","og_description":"Cryptocurrency Malware is targeting Androids in the US and abroad. Here's what you need to know about the threats they're posing to your mobile phones and how to stay protected.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-02-15T15:00:13+00:00","article_modified_time":"2025-08-05T16:24:31+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Warning: Crypto-Currency Mining is Targeting Your Android","datePublished":"2018-02-15T15:00:13+00:00","dateModified":"2025-08-05T16:24:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/"},"wordCount":726,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","keywords":["android","malware","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/","name":"Warning: Crypto-Currency Mining is Targeting Your Android | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","datePublished":"2018-02-15T15:00:13+00:00","dateModified":"2025-08-05T16:24:31+00:00","description":"Cryptocurrency Malware is targeting Androids in the US and abroad. Here's what you need to know about the threats they're posing to your mobile phones and how to stay protected.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/06\/300x200_Bitcoin.jpg","width":300,"height":200,"caption":"Bitcoin transaction on mobile"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/warning-crypto-currency-mining-targeting-android\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Warning: Crypto-Currency Mining is Targeting Your Android"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84485"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84485\/revisions"}],"predecessor-version":[{"id":214362,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84485\/revisions\/214362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/125960"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84485"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}