{"id":84808,"date":"2018-02-28T06:00:20","date_gmt":"2018-02-28T14:00:20","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=84808"},"modified":"2025-05-26T00:51:37","modified_gmt":"2025-05-26T07:51:37","slug":"key-mobile-threat-takeaways-2018-mobile-threats-report","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/","title":{"rendered":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report"},"content":{"rendered":"<p>The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable watches, tablets, even home devices all fall under the mobile umbrella of IoT and have the ability to impact our lives for better, or for worse.<\/p>\n<p>This rich IoT landscape holds the key to your digital identity, your connected home and potentially, even your kid\u2019s digital future. <a href=\"https:\/\/www.gartner.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner predicts<\/a> that by the year 2020, 20.8 billion connected devices will populate the consumer home. (Current global population is 7.6 billion people.) As these devices continue to increase in presence in our daily lives, it\u2019s important to understand not only the convenience they offer, but the threats they pose as well.<\/p>\n<p>With the dawn of an even more connected era fast approaching, we at McAfee are examining the mobile threats that might be waiting on the horizon. This year\u2019s Mobile Threat Report, takes a deep dive into some significant trends that demonstrate just how these mobile platforms are targeting what\u2019s most sacred to us \u2013 our home. Let\u2019s take a look into some of the most common trends in mobile malware, and a few tips on how to protect your home.<\/p>\n<h2><strong>Mobile Malware in the IoT Home \u00a0<\/strong><\/h2>\n<p>According to <a href=\"https:\/\/www.gartner.com\/newsroom\/id\/3598917\" target=\"_blank\" rel=\"noopener noreferrer\">Gartner<\/a>, 8.4 billion connected \u201cthings\u201d were in use last year, and chances are one or more of these devices is living in your home today. While many of these devices bring convenience and ease to the home, it\u2019s important to note that they also significantly increase the risk of attack. Many of these devices are developed with innovation in mind, and little to no focus on &#8211; security. With that being said, everyday users of mobile devices have grown phenomenally, hence the increased need for security as the frequency of mobile attacks continues to grow.<\/p>\n<h2><strong>DDoS Causes SOS \u00a0<\/strong><\/h2>\n<p>IoT attacks such as\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/connected-homes-mirais-new-best-friend\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mirai<\/a>\u00a0and\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot_reaper\/\" target=\"_blank\" rel=\"noopener noreferrer\">Reaper<\/a> showed the world just how vulnerable smart homes and connected devices can be to malicious code. These attacks\u00a0targeted millions of IoT devices with the intent of creating a botnet\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/connected-homes-mirais-new-best-friend\/\" target=\"_blank\" rel=\"noopener noreferrer\">army<\/a>\u00a0from trusted connected items within the household.<\/p>\n<p>The Mirai malware authors, leveraged consumer devices such as IP cameras and home routers to create a botnet army, launching distributed denial of service (DDoS) attacks against popular websites. By taking advantage of the low-levels of security on most home connected devices, this malware was able to seize control of millions of devices. All it had to do was guess the factory default password.<\/p>\n<p>The \u201c<a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot_reaper\/\" target=\"_blank\" rel=\"noopener noreferrer\">Reape<\/a>r\u201d malware strain also took advantage of limited security of many connected home devices. However, these malware authors evolved their tactics by looking for devices with known vulnerabilities to exploit and by implementing a set of hacking tools that showed greater sophistication. The IoT reaper clocked in as many as 2 million infected devices, at <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot_reaper\/\" target=\"_blank\" rel=\"noopener noreferrer\">nearly ten times the rate<\/a> as Mirai.<\/p>\n<p>The evolution of the malicious code targeting mobile and IoT devices represents a growing threat to consumers who wish to embrace a culture of connected living. So how can we welcome these devices into our homes without opening the door to cyberthreats? Here are a few tips to consider:<\/p>\n<ul>\n<li><strong>Protect your devices, protect your home.<\/strong> As we continue to embrace a culture of smart homes and connected devices, it is also important for us to embrace internet security at a network level. With the presence of targeted attacks growing globally, we must remain vigilant in protecting our connected lives by making sure each individual device is secure, especially the home network. The MTR has dubbed 2018 as \u201cThe Year of Mobile Malware,\u201d and very tech user should consider using a home gateway with <a href=\"https:\/\/securehomeplatform.mcafee.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">built-in security<\/a> to ensure every device in their home is protected.<\/li>\n<li><strong>Download apps with caution and update them regularly. <\/strong>Malware campaigns having been targeting users on the Google Play stores almost since its inception. In fact, McAfee recently discovered Android <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/grabos-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Grabos,\u00a0<\/a>one of the most significant campaigns of this year, found present within 144 apps on Google Play. Stay current on which applications are supported in your application store and update them regularly. If an app is no longer supported in the play store, delete it immediately.<\/li>\n<li><strong>Invest in comprehensive security.<\/strong> I can\u2019t stress enough how important is to use comprehensive\u00a0<a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">security software\u00a0<\/a>to protect your personal devices. Malware is constantly evolving with technology, so ensure your all of your devices are secured with built-in protection.<\/li>\n<\/ul>\n<p>Interested in learning more about IT and mobile security tips and trends? Follow <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more&#8230;<\/p>\n","protected":false},"author":674,"featured_media":116515,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[4322,5084,4238,4295,214],"coauthors":[3973],"class_list":["post-84808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-app-security","tag-iot","tag-mcafee-mobile-security","tag-mobile","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-28T14:00:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T07:51:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"203\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report\",\"datePublished\":\"2018-02-28T14:00:20+00:00\",\"dateModified\":\"2025-05-26T07:51:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\"},\"wordCount\":772,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg\",\"keywords\":[\"app security\",\"IoT\",\"McAfee Mobile Security\",\"mobile\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\",\"name\":\"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg\",\"datePublished\":\"2018-02-28T14:00:20+00:00\",\"dateModified\":\"2025-05-26T07:51:37+00:00\",\"description\":\"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg\",\"width\":360,\"height\":203,\"caption\":\"Mobile BRATA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog","description":"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog","og_description":"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-02-28T14:00:20+00:00","article_modified_time":"2025-05-26T07:51:37+00:00","og_image":[{"width":360,"height":203,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report","datePublished":"2018-02-28T14:00:20+00:00","dateModified":"2025-05-26T07:51:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/"},"wordCount":772,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg","keywords":["app security","IoT","McAfee Mobile Security","mobile","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/","name":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg","datePublished":"2018-02-28T14:00:20+00:00","dateModified":"2025-05-26T07:51:37+00:00","description":"The term \u201cmobile\u201d has come to encompass a wide range of devices these days. Mobile devices have become much more than our Androids and iPhones. Wearable","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/01\/WiFi-Mobile-VPN-e1611938755461.jpeg","width":360,"height":203,"caption":"Mobile BRATA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/key-mobile-threat-takeaways-2018-mobile-threats-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Key Mobile Threat Takeaways from the 2018 Mobile Threat Report"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=84808"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84808\/revisions"}],"predecessor-version":[{"id":214281,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/84808\/revisions\/214281"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/116515"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=84808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=84808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=84808"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=84808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}